Command Injection Vulnerability in D-Link DI-7200GV2 Device
CVE-2021-46226
9.8CRITICAL
Summary
The D-Link DI-7200GV2 device is susceptible to a command injection vulnerability within its wget_test.asp functionality. This flaw permits unprivileged attackers to inject and execute arbitrary commands through the manipulation of the url parameter, potentially compromising the device's integrity. It's essential for users and network administrators to apply security best practices and monitor for updates to safeguard against exploitation.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved