CVE-2020-21016: n/a in n/a
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary code as root via HNAP1/control/SetGuestWLanSettings.php.
AI Analysis
Technical Summary
CVE-2020-21016 is a critical remote code execution vulnerability affecting D-Link DIR-846 routers running firmware version 100A35. The vulnerability exists in the handling of requests to the HNAP1/control/SetGuestWLanSettings.php endpoint. Specifically, it allows unauthenticated remote attackers to execute arbitrary code with root privileges by sending crafted HTTP requests to this endpoint. The root cause is related to improper input validation leading to code injection, classified under CWE-94 (Improper Control of Generation of Code). The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is easy to exploit over the network without any authentication or user interaction, and results in full compromise of confidentiality, integrity, and availability of the affected device. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a significant threat. The affected device is a widely used consumer and small office router, which if compromised, can be used to intercept, manipulate, or disrupt network traffic, launch further attacks on internal networks, or serve as a foothold for persistent attacker presence.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many small and medium enterprises (SMEs), home offices, and even some larger organizations use consumer-grade routers like the D-Link DIR-846 due to cost and availability. Exploitation could lead to complete network compromise, allowing attackers to intercept sensitive communications, steal credentials, inject malicious payloads into network traffic, or disrupt business operations. Given the root-level access gained, attackers could also pivot to other internal systems, leading to broader network breaches. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale, increasing the risk of widespread attacks. Additionally, compromised routers could be enlisted into botnets, amplifying the threat to European internet infrastructure and services.
Mitigation Recommendations
Since no official patches or firmware updates are listed, immediate mitigation should focus on network-level controls and device configuration. Organizations should: 1) Restrict remote access to the router’s management interface, especially blocking WAN-side access to the HNAP service and related endpoints. 2) Place affected routers behind firewalls that limit inbound traffic to trusted sources only. 3) Disable remote management features if not required. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts targeting HNAP endpoints. 5) Consider replacing affected devices with models that have received security updates or are known to be secure. 6) Implement network segmentation to limit the impact of a compromised router on critical internal systems. 7) Educate users about the risks of using outdated firmware and encourage regular updates where available. 8) Employ intrusion detection/prevention systems with signatures for HNAP-related exploits.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2020-21016: n/a in n/a
Description
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary code as root via HNAP1/control/SetGuestWLanSettings.php.
AI-Powered Analysis
Technical Analysis
CVE-2020-21016 is a critical remote code execution vulnerability affecting D-Link DIR-846 routers running firmware version 100A35. The vulnerability exists in the handling of requests to the HNAP1/control/SetGuestWLanSettings.php endpoint. Specifically, it allows unauthenticated remote attackers to execute arbitrary code with root privileges by sending crafted HTTP requests to this endpoint. The root cause is related to improper input validation leading to code injection, classified under CWE-94 (Improper Control of Generation of Code). The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is easy to exploit over the network without any authentication or user interaction, and results in full compromise of confidentiality, integrity, and availability of the affected device. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a significant threat. The affected device is a widely used consumer and small office router, which if compromised, can be used to intercept, manipulate, or disrupt network traffic, launch further attacks on internal networks, or serve as a foothold for persistent attacker presence.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many small and medium enterprises (SMEs), home offices, and even some larger organizations use consumer-grade routers like the D-Link DIR-846 due to cost and availability. Exploitation could lead to complete network compromise, allowing attackers to intercept sensitive communications, steal credentials, inject malicious payloads into network traffic, or disrupt business operations. Given the root-level access gained, attackers could also pivot to other internal systems, leading to broader network breaches. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale, increasing the risk of widespread attacks. Additionally, compromised routers could be enlisted into botnets, amplifying the threat to European internet infrastructure and services.
Mitigation Recommendations
Since no official patches or firmware updates are listed, immediate mitigation should focus on network-level controls and device configuration. Organizations should: 1) Restrict remote access to the router’s management interface, especially blocking WAN-side access to the HNAP service and related endpoints. 2) Place affected routers behind firewalls that limit inbound traffic to trusted sources only. 3) Disable remote management features if not required. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts targeting HNAP endpoints. 5) Consider replacing affected devices with models that have received security updates or are known to be secure. 6) Implement network segmentation to limit the impact of a compromised router on critical internal systems. 7) Educate users about the risks of using outdated firmware and encourage regular updates where available. 8) Employ intrusion detection/prevention systems with signatures for HNAP-related exploits.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2020-08-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9a6d
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 2:40:47 PM
Last updated: 8/9/2025, 8:30:30 AM
Views: 14
Related Threats
CVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumCVE-2025-8091: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ashanjay EventON – Events Calendar
MediumCVE-2025-8080: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alobaidi Alobaidi Captcha
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.