SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP D-Link DIR-823G routers HNAP1 command injection attempt
This event is generated when there is a command injection attempt in the request body of a crafted HNAP1 request. Impact: Base Score: 8.1 HIGH Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (V3.0 legend) Impact Score: 5.9 Exploitability Score: 2.2 Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None Scope (S): Unchanged Confidentiality (C): High Integrity (I): High Availability (A): High Details: Ease of Attack:
This event is generated when there is a command injection attempt in the request body of a crafted HNAP1 request.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2019-7298 |
Loading description
|
Tactic: Execution
Technique: Exploitation for Client Execution
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org