提交 #517958: D-LINK Dir-823x 240126, 240802 Command Injection信息

标题D-LINK Dir-823x 240126, 240802 Command Injection
描述A command injection vulnerability in D-Link DIR-823X Series Routers with firmware versions 240126/240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/diag_nslookup via the corresponding function, triggering remote command execution.
来源⚠️ https://github.com/mono7s/Dir-823x/blob/main/diag_nslookup/diag_nslookup.md
用户
 Sta8r9 (UID 82657)
提交2025-03-11 08時32分 (1 年前)
管理2025-03-24 12時49分 (13 days later)
状态已接受
VulDB条目300737 [D-Link DIR-823X 240126/240802 HTTP POST Request /goform/diag_nslookup sub_41710C target_addr 权限提升]
积分18

Interested in the pricing of exploits?

See the underground prices here!