In the "webupg" binary of D-Link DIR-825 G1, because of the lack of parameter verification, attackers can use "cmd" parameters to execute arbitrary system commands after obtaining authorization.
- https://github.com/tgp-top/D-Link-DIR-825
- https://www.dlink.com/en/security-bulletin/
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon