Submeter #604443: D-Link D-Link DI-7300G+ DI-7300G+ V19.12.25A1 OS Command Injectioninformação

TítuloD-Link D-Link DI-7300G+ DI-7300G+ V19.12.25A1 OS Command Injection
DescriçãoA command injection vulnerability was discovered in D-Link DI-7300G+ V19.12.25A1, triggered by the proxy_srv, proxy_lanport, proxy_lanip, and proxy_srvport parameters in proxy_client.asp. Attackers can exploit this vulnerability by crafting malicious packets to execute arbitrary commands, thereby achieving full control over the target device.
Fonte⚠️ https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
Utilizador
 shiny (UID 76015)
Submissão26/06/2025 09h52 (há 9 meses)
Moderação29/06/2025 13h56 (3 days later)
EstadoAceite
Entrada VulDB314390 [D-Link DI-7300G+ 19.12.25A1 in proxy_client.asp proxy_srv/proxy_lanport/proxy_lanip/proxy_srvport Elevação de Privilégios]
Pontos19

Want to know what is going to be exploited?

We predict KEV entries!