This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 v1.01rc001 Wi-Fi access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of CGI scripts. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11369.
No PoCs from references.
- https://github.com/Alonzozzz/alonzzzo
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/SexyBeast233/SecBooks
- https://github.com/tzwlhack/Vulnerability