CVE-2024-7833

A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/aLtEr6/pdf/blob/main/3.pdf Broken Link
https://vuldb.com/?ctiid.274731 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.274731 Third Party Advisory VDB Entry
https://vuldb.com/?submit.385338 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:di-8100_firmware:16.07:*:*:*:*:*:*:*
cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-08-15 14:15

Updated : 2024-08-19 16:00


NVD link : CVE-2024-7833

Mitre link : CVE-2024-7833

CVE.ORG link : CVE-2024-7833


JSON object : View

Products Affected

dlink

  • di-8100_firmware
  • di-8100
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')