An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.
Use CWE-78, D-Link vendor hub and Dir-823g Firmware product page to widen CVE-2019-7297 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2018-17881, CVE-2018-17787 and CVE-2018-17786 for nearby disclosures in the same product family.