提交 #676887: D-Link Gateway V19.09.19A1 and V24.04.18B1 Arbitrary Command Execution or Command Injection信息

标题D-Link Gateway V19.09.19A1 and V24.04.18B1 Arbitrary Command Execution or Command Injection
描述A validation command execution vulnerability was discovered in D-Link's related product DI-7001MINI-8G Gateway, which can be exploited by attackers by sending malicious HTTP GET packets to cause arbitrary command execution or command injection, which can be triggered when the request path is /msp_info.htm. In the msp_info_htm function, the flag and cmd parameter concatenate the command and run the system function without filtering.
来源⚠️ https://github.com/DavCloudz/cve/issues/7
用户
 Yun Zhang (UID 90491)
提交2025-10-16 10時44分 (6 月前)
管理2025-10-26 18時19分 (10 days later)
状态已接受
VulDB条目329985 [D-Link DI-7001 MINI 19.09.19A1/24.04.18B1 /msp_info.htm cmd 权限提升]
积分20

Interested in the pricing of exploits?

See the underground prices here!