A command injection vulnerability exists in the D-Link...
Moderate severity
Unreviewed
Published
Nov 13, 2025
to the GitHub Advisory Database
•
Updated Nov 14, 2025
Description
Published by the National Vulnerability Database
Nov 13, 2025
Published to the GitHub Advisory Database
Nov 13, 2025
Last updated
Nov 14, 2025
A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the
prog.cgiandrcbinaries. Thesub_433188function inprog.cgistores user-supplied email configuration parameters (EmailFrom,EmailTo,SMTPServerAddress,SMTPServerPort,AccountName) in NVRAM vianvram_safe_set. These values are later retrieved in thesub_448FDCfunction ofrcusingnvram_safe_getand concatenated into shell commands executed viatwsystem()without sanitization. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device through specially crafted HTTP requests to the router's web interface.References