Vulnerability Description
A vulnerability was determined in D-Link DIR-822 A_101. The impacted element is the function system of the file /udhcpcd/dhcpd.c of the component udhcpd DHCP Service. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-822 Firmware | 1.0.1 |
| Dlink | Dir-822 | a1 |
Related Weaknesses (CWE)
References
- https://tzh00203.notion.site/D-Link-DIR-822-A1-Command-Injection-in-udhcpd-via-DExploitThird Party Advisory
- https://vuldb.com/submit/798645Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/359642Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/359642/ctiPermissions RequiredVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2026-7067?
CVE-2026-7067 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was determined in D-Link DIR-822 A_101. The impacted element is the function system of the file /udhcpcd/dhcpd.c of the component udhcpd DHCP Service. This manipulation of the argument...
How severe is CVE-2026-7067?
CVE-2026-7067 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7067?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-822 Firmware, Dlink Dir-822.