Lyrie
Active Exploitation
ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·3/25/2022

CVE-2016-11021 added to CISA KEV: D-Link DCS-930L Devices

Status: ✅ Confirmed exploited in the wild

Date added: 2022-03-25

Required action: The impacted product is end-of-life and should be disconnected if still in use.

Due date: 2022-04-15

Why this matters

setSystemCommand on D-Link DCS-930L devices allows a remote attacker to execute code via an OS command.

Sources

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.