D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the wl(0).(0)_ssid parameter. This vulnerability is exploited via a crafted POST request.
https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44342
https://thehackernews.com/2024/09/zyxel-patches-critical-os-command.html
https://securityaffairs.com/168041/security/d-link-dir-846-routers-code-execution-flaws.html
https://www.bleepingcomputer.com/news/security/d-link-says-it-is-not-fixing-four-rce-flaws-in-dir-846w-routers/
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10411
https://www.dlink.com/en/security-bulletin/
http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W
Source: Mitre, NVD
Published: 2024-08-27
Updated: 2024-08-30
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.00603