CVE-2020-21016: n/a in n/a
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary code as root via HNAP1/control/SetGuestWLanSettings.php.
AI Analysis
Technical Summary
CVE-2020-21016 is a critical remote code execution vulnerability affecting D-Link DIR-846 routers running firmware version 100A35. The vulnerability exists in the handling of requests to the HNAP1/control/SetGuestWLanSettings.php endpoint. Specifically, it allows unauthenticated remote attackers to execute arbitrary code with root privileges by sending crafted HTTP requests to this endpoint. The root cause is related to improper input validation leading to code injection, classified under CWE-94 (Improper Control of Generation of Code). The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is easy to exploit over the network without any authentication or user interaction, and results in full compromise of confidentiality, integrity, and availability of the affected device. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a significant threat. The affected device is a widely used consumer and small office router, which if compromised, can be used to intercept, manipulate, or disrupt network traffic, launch further attacks on internal networks, or serve as a foothold for persistent attacker presence.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many small and medium enterprises (SMEs), home offices, and even some larger organizations use consumer-grade routers like the D-Link DIR-846 due to cost and availability. Exploitation could lead to complete network compromise, allowing attackers to intercept sensitive communications, steal credentials, inject malicious payloads into network traffic, or disrupt business operations. Given the root-level access gained, attackers could also pivot to other internal systems, leading to broader network breaches. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale, increasing the risk of widespread attacks. Additionally, compromised routers could be enlisted into botnets, amplifying the threat to European internet infrastructure and services.
Mitigation Recommendations
Since no official patches or firmware updates are listed, immediate mitigation should focus on network-level controls and device configuration. Organizations should: 1) Restrict remote access to the router’s management interface, especially blocking WAN-side access to the HNAP service and related endpoints. 2) Place affected routers behind firewalls that limit inbound traffic to trusted sources only. 3) Disable remote management features if not required. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts targeting HNAP endpoints. 5) Consider replacing affected devices with models that have received security updates or are known to be secure. 6) Implement network segmentation to limit the impact of a compromised router on critical internal systems. 7) Educate users about the risks of using outdated firmware and encourage regular updates where available. 8) Employ intrusion detection/prevention systems with signatures for HNAP-related exploits.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2020-21016: n/a in n/a
Description
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary code as root via HNAP1/control/SetGuestWLanSettings.php.
AI-Powered Analysis
Technical Analysis
CVE-2020-21016 is a critical remote code execution vulnerability affecting D-Link DIR-846 routers running firmware version 100A35. The vulnerability exists in the handling of requests to the HNAP1/control/SetGuestWLanSettings.php endpoint. Specifically, it allows unauthenticated remote attackers to execute arbitrary code with root privileges by sending crafted HTTP requests to this endpoint. The root cause is related to improper input validation leading to code injection, classified under CWE-94 (Improper Control of Generation of Code). The vulnerability has a CVSS 3.1 base score of 9.8, indicating it is easy to exploit over the network without any authentication or user interaction, and results in full compromise of confidentiality, integrity, and availability of the affected device. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a significant threat. The affected device is a widely used consumer and small office router, which if compromised, can be used to intercept, manipulate, or disrupt network traffic, launch further attacks on internal networks, or serve as a foothold for persistent attacker presence.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Many small and medium enterprises (SMEs), home offices, and even some larger organizations use consumer-grade routers like the D-Link DIR-846 due to cost and availability. Exploitation could lead to complete network compromise, allowing attackers to intercept sensitive communications, steal credentials, inject malicious payloads into network traffic, or disrupt business operations. Given the root-level access gained, attackers could also pivot to other internal systems, leading to broader network breaches. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale, increasing the risk of widespread attacks. Additionally, compromised routers could be enlisted into botnets, amplifying the threat to European internet infrastructure and services.
Mitigation Recommendations
Since no official patches or firmware updates are listed, immediate mitigation should focus on network-level controls and device configuration. Organizations should: 1) Restrict remote access to the router’s management interface, especially blocking WAN-side access to the HNAP service and related endpoints. 2) Place affected routers behind firewalls that limit inbound traffic to trusted sources only. 3) Disable remote management features if not required. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts targeting HNAP endpoints. 5) Consider replacing affected devices with models that have received security updates or are known to be secure. 6) Implement network segmentation to limit the impact of a compromised router on critical internal systems. 7) Educate users about the risks of using outdated firmware and encourage regular updates where available. 8) Employ intrusion detection/prevention systems with signatures for HNAP-related exploits.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2020-08-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9a6d
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 2:40:47 PM
Last updated: 2/7/2026, 12:25:32 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.