SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP D-Link DIR_818L ssdpcgi command injection attempt
This rule looks for HTTP requests to the "/cgi-bin/ssdpcgi" endpoint that include the "ST:" header set to "ssdp:all" and contain command injection metacharacters in one of the vulnerable headers. Successful exploitation allows remote code execution on the router.
This rule fires on attempts to exploit a command injection vulnerability in D-Link DIR-818L router web interface.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
Rule Categories::Server::Web Applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Vulnerability::Severity::High
Vulnerability::Severity::Medium
Vulnerability::Severity::Critical
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2025-8956 |
Loading description
|