提出 #604444: D-Link D-Link DI-7300G+、D-Link DI-8200G DI-7300G+ V19.12.25A1、DI_8200G-17.12.20A1 OS Command Injection情報

タイトルD-Link D-Link DI-7300G+、D-Link DI-8200G DI-7300G+ V19.12.25A1、DI_8200G-17.12.20A1 OS Command Injection
説明A command injection vulnerability was discovered in D-Link DI-7300G+ V19.12.25A1 and DI_8200G-17.12.20A1, triggered by the flag, cmd, and iface parameters in msp_info.htm. Attackers can exploit this vulnerability by crafting malicious packets to execute arbitrary commands, thereby gaining full control of the target device.
ソース⚠️ https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
ユーザー
 shiny (UID 76015)
送信2025年06月26日 09:53 (9 月 ago)
モデレーション2025年06月29日 13:56 (3 days later)
ステータス承諾済み
VulDBエントリ314391 [D-Link DI-7300G+/DI-8200G 17.12.20A1/19.12.25A1 msp_info.htm flag/cmd/iface 特権昇格]
ポイント19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!