httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI.
https://securityaffairs.com/185135/malware/new-mirai-variant-shadowv2-tests-iot-exploits-amid-aws-disruption.html
https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
https://www.bleepingcomputer.com/news/security/new-shadowv2-botnet-malware-used-aws-outage-as-a-test-opportunity/
http://www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/
http://www.osvdb.org/55990
http://www.exploit-db.com/exploits/9209
http://www.dd-wrt.com/
http://securitytracker.com/id?1022596
http://isc.sans.org/diary.html?storyid=6853
Source: Mitre, NVD
Published: 2009-08-14
Updated: 2025-04-09
Base Score: 8.3
Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.9168