Vulnerability Description
An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-802 Firmware | <= 1.00b05 |
| Dlink | Dir-802 | a1 |
Related Weaknesses (CWE)
References
- https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-InjectionExploitThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1Vendor Advisory
- https://www.dlink.com/en/security-bulletin/Vendor Advisory
- https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-InjectionExploitThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1Vendor Advisory
- https://www.dlink.com/en/security-bulletin/Vendor Advisory
FAQ
What is CVE-2021-29379?
CVE-2021-29379 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payloa...
How severe is CVE-2021-29379?
CVE-2021-29379 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29379?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-802 Firmware, Dlink Dir-802.