| Название | D-Link D-Link DI-7300G+ DI-7300G+ V19.12.25A1 OS Command Injection |
|---|
| Описание | A command injection vulnerability was discovered in D-Link DI-7300G+ V19.12.25A1, triggered by the proxy_srv, proxy_lanport, proxy_lanip, and proxy_srvport parameters in proxy_client.asp. Attackers can exploit this vulnerability by crafting malicious packets to execute arbitrary commands, thereby achieving full control over the target device. |
|---|
| Источник | ⚠️ https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf |
|---|
| Пользователь | shiny (UID 76015) |
|---|
| Представление | 26.06.2025 09:52 (9 месяцы назад) |
|---|
| Модерация | 29.06.2025 13:56 (3 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 314390 [D-Link DI-7300G+ 19.12.25A1 in proxy_client.asp proxy_srv/proxy_lanport/proxy_lanip/proxy_srvport эскалация привилегий] |
|---|
| Баллы | 19 |
|---|