### [CVE-2021-3708](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3708) ![](https://img.shields.io/static/v1?label=Product&message=DSL-2750U&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=firmware%20vME1.16%20or%20prior%20versions%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brightgreen) ### Description D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to OS command injection. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3707, to execute any OS commands on the vulnerable device. ### POC #### Reference - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20%28firmware%20version%201.6%29/README.md - https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/HadiMed/DSL-2750U-Full-chain - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/WhooAmii/POC_to_review - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/n0-traces/cve_monitor - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve