Submit #604441: D-Link D-Link DI-7300G+ DI-7300G+ V19.12.25A1 OS Command Injectioninfo

TitleD-Link D-Link DI-7300G+ DI-7300G+ V19.12.25A1 OS Command Injection
DescriptionA command injection vulnerability was discovered in D-Link DI-7300G+ V19.12.25A1, triggered by the url parameter in wget_test.asp. Attackers can exploit this vulnerability by constructing malicious packets to execute arbitrary commands, thereby gaining full control of the target device.
Source⚠️ https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
User
 shiny (UID 76015)
Submission06/26/2025 09:48 (9 months ago)
Moderation06/29/2025 13:56 (3 days later)
StatusAccepted
VulDB entry314388 [D-Link DI-7300G+ 19.12.25A1 wget_test.asp url os command injection]
Points18

Do you know our Splunk app?

Download it now for free!