Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2020-21016: n/a in n/a

0
Critical
VulnerabilityCVE-2020-21016cvecve-2020-21016
Published: Mon Oct 31 2022 (10/31/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary code as root via HNAP1/control/SetGuestWLanSettings.php.

AI-Powered Analysis

AILast updated: 07/05/2025, 14:40:47 UTC

Technical Analysis

CVE-2020-21016 is a critical remote code execution vulnerability affecting D-Link DIR-846 routers running firmware version 100A35. The vulnerability exists in the handling of requests to the HNAP1/control/SetGuestWLanSettings.php endpoint. Specifically, it allows unauthenticated remote attackers to execute arbitrary code with root privileges by sending crafted HTTP requests to this endpoint. The root cause is related to improper input validation leading to code injection, classified under CWE-94 (Improper Control of Generation of Code). The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is easy to exploit over the network without any authentication or user interaction, and results in full compromise of confidentiality, integrity, and availability of the affected device. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a significant threat. The affected device is a widely used consumer and small office router, which if compromised, can be used to intercept, manipulate, or disrupt network traffic, launch further attacks on internal networks, or serve as a foothold for persistent attacker presence.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Many small and medium enterprises (SMEs), home offices, and even some larger organizations use consumer-grade routers like the D-Link DIR-846 due to cost and availability. Exploitation could lead to complete network compromise, allowing attackers to intercept sensitive communications, steal credentials, inject malicious payloads into network traffic, or disrupt business operations. Given the root-level access gained, attackers could also pivot to other internal systems, leading to broader network breaches. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale, increasing the risk of widespread attacks. Additionally, compromised routers could be enlisted into botnets, amplifying the threat to European internet infrastructure and services.

Mitigation Recommendations

Since no official patches or firmware updates are listed, immediate mitigation should focus on network-level controls and device configuration. Organizations should: 1) Restrict remote access to the router’s management interface, especially blocking WAN-side access to the HNAP service and related endpoints. 2) Place affected routers behind firewalls that limit inbound traffic to trusted sources only. 3) Disable remote management features if not required. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts targeting HNAP endpoints. 5) Consider replacing affected devices with models that have received security updates or are known to be secure. 6) Implement network segmentation to limit the impact of a compromised router on critical internal systems. 7) Educate users about the risks of using outdated firmware and encourage regular updates where available. 8) Employ intrusion detection/prevention systems with signatures for HNAP-related exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-08-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9a6d

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 2:40:47 PM

Last updated: 2/7/2026, 12:25:32 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats