D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1,...
High severity
Unreviewed
Published
Sep 9, 2024
to the GitHub Advisory Database
•
Updated Sep 10, 2024
Description
Published by the National Vulnerability Database
Sep 9, 2024
Published to the GitHub Advisory Database
Sep 9, 2024
Last updated
Sep 10, 2024
D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by sending a carefully crafted malicious string to the CGI function responsible for handling usb_paswd.asp.
References