| शीर्षक | D-Link Gateway V19.09.19A1 and V24.04.18B1 Arbitrary Command Execution or Command Injection |
|---|
| विवरण | A validation command execution vulnerability was discovered in D-Link's related product DI-7001MINI-8G Gateway, which can be exploited by attackers by sending malicious HTTP GET packets to cause arbitrary command execution or command injection, which can be triggered when the request path is /msp_info.htm. In the msp_info_htm function, the flag and cmd parameter concatenate the command and run the system function without filtering. |
|---|
| स्रोत | ⚠️ https://github.com/DavCloudz/cve/issues/7 |
|---|
| उपयोगकर्ता | Yun Zhang (UID 90491) |
|---|
| सबमिशन | 16/10/2025 10:44 AM (6 महीनों पहले) |
|---|
| संयम | 26/10/2025 06:19 PM (10 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 329985 [D-Link DI-7001 MINI 19.09.19A1/24.04.18B1 /msp_info.htm cmd अधिकार वृद्धि] |
|---|
| अंक | 20 |
|---|