D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)
A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.
CVE-2026-5844 describes a critical command injection vulnerability affecting D-Link DIR-882 routers running firmware version 1.01B02. The vulnerability resides in the sprintf function within the prog.cgi script, specifically within the HNAP1 SetNetworkSettings Handler. A remote, unauthenticated attacker can exploit this flaw by manipulating the IPAddress argument, injecting arbitrary OS commands that are then executed with elevated privileges. The vulnerability is considered critical due to the potential for complete system compromise and the availability of a public exploit. This vulnerability impacts products that are no longer supported by the maintainer, increasing the risk for users who have not migrated to newer devices.
Attack Chain
- The attacker identifies a vulnerable D-Link DIR-882 router running firmware version 1.01B02.
- The attacker sends a crafted HTTP request to the
prog.cgiendpoint. - The HTTP request targets the HNAP1 SetNetworkSettings Handler.
- The attacker manipulates the
IPAddressargument within the HTTP request, injecting malicious OS commands. - The
sprintffunction inprog.cgiprocesses the attacker-controlledIPAddressargument without proper sanitization. - The injected OS commands are executed on the router’s operating system due to the command injection vulnerability in
sprintf. - The attacker gains remote code execution on the router.
- The attacker can then perform actions such as modifying router settings, eavesdropping on network traffic, or using the router as a botnet node.
Impact
Successful exploitation of CVE-2026-5844 allows a remote attacker to execute arbitrary OS commands on the vulnerable D-Link DIR-882 router. This can lead to a complete compromise of the device, enabling attackers to reconfigure the router, intercept network traffic, or use the compromised device as part of a botnet. The vulnerability affects end-of-life products, meaning no official patches are available. The impact is significant due to the widespread use of these routers in home and small business networks, where they can act as a gateway to internal systems.
Recommendation
- Deploy the Sigma rule
Detect D-Link DIR-882 Command Injection Attemptto detect suspicious requests toprog.cgicontaining shell metacharacters. - Block access to the URL
https://files.catbox.moe/ei31k1.zipto prevent the download of the publicly available exploit (IOC). - Monitor web server logs for HTTP requests to
prog.cgiwith unusually longIPAddressparameters (log source: webserver). - Implement network intrusion detection systems (IDS) rules to identify and block exploit attempts targeting CVE-2026-5844 (log source: network_connection).
Detection coverage 2
Detect D-Link DIR-882 Command Injection Attempt
criticalDetects potential command injection attempts targeting the D-Link DIR-882 router via the prog.cgi script by looking for shell metacharacters in the IPAddress parameter.
D-Link DIR-882 Suspicious POST Request to prog.cgi
mediumDetects suspicious POST requests to prog.cgi, which may indicate exploitation attempts against D-Link DIR-882 routers.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
1
url
| Type | Value |
|---|---|
| url | https://files.catbox.moe/ei31k1.zip |
| [email protected] |