Title: D-Link DCS700I v1.03.09 Command Injection Description: A Command Injection vulnerability has been discovered in the LightSensorControl parameter of D-Link DCS700I v1.03.09. The vulnerability arises from improper handling of user-controlled input, which is passed directly into a system command without sufficient sanitization. The LightSensorControl parameter is incorporated into a shell command (gpio lightcontrol %s &), and an attacker can manipulate it to inject arbitrary shell commands. This allows remote execution of malicious commands on the device, potentially compromising its integrity, leaking sensitive information, and facilitating further attacks. The lack of input validation and sanitization makes the device susceptible to malicious input exploitation. Source: https://tzh00203.notion.site/D-Link-DCS700I-v1-03-09-Command-Injection-Vulnerability-in-LightSensorControl-Parameter-2e6b5c52018a80ada0f6d7e72efd7a45?source=copy_link User: tian (UID 93438) Submission: 01/12/2026 02:45 PM (14 days ago) Moderation: 01/25/2026 03:14 PM (13 days later) Status: Accepted VulDB Entry: 342815 [D-Link DCS700I 1.03.09 Web Form /setDayNightMode LightSensorControl command injection] Points: 17