| Titel | D-Link D-Link DI-7300G+ DI-7300G+ V19.12.25A1 OS Command Injection |
|---|
| Beschreibung | A command injection vulnerability was discovered in D-Link DI-7300G+ V19.12.25A1, triggered by the url parameter in wget_test.asp. Attackers can exploit this vulnerability by constructing malicious packets to execute arbitrary commands, thereby gaining full control of the target device. |
|---|
| Quelle | ⚠️ https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf |
|---|
| Benutzer | shiny (UID 76015) |
|---|
| Einreichung | 26.06.2025 09:48 (vor 9 Monaten) |
|---|
| Moderieren | 29.06.2025 13:56 (3 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 314388 [D-Link DI-7300G+ 19.12.25A1 wget_test.asp url erweiterte Rechte] |
|---|
| Punkte | 18 |
|---|