{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3485","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-03T15:23:23.561Z","datePublished":"2026-03-03T21:02:10.454Z","dateUpdated":"2026-03-03T21:32:41.532Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-03T21:02:10.454Z"},"title":"D-Link DIR-868L SSDP Service sub_1BF84 os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"D-Link","product":"DIR-868L","versions":[{"version":"110b03","status":"affected"}],"modules":["SSDP Service"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-03T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-03T16:28:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Xuhsy (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.348560","name":"VDB-348560 | D-Link DIR-868L SSDP Service sub_1BF84 os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.348560","name":"VDB-348560 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.764759","name":"Submit #764759 | D-Link dir-868I REVA1_FW110b03 OS Command Injection","tags":["third-party-advisory"]},{"url":"https://kn0sinna.notion.site/dlink-dir-868l-ssdp-command-injection-30eb1876cd6e80caa691de6fe5cab59c","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-03T21:32:35.283147Z","id":"CVE-2026-3485","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-03T21:32:41.532Z"}}]}}