Command Injection Vulnerability in D-Link DI-7200GV2 Device
CVE-2021-46227

9.8CRITICAL

Key Information:

Vendor
D-Link
Vendor
CVE Published:
4 February 2022

Summary

The D-Link DI-7200GV2 device, specifically version v21.04.09E1, is vulnerable to command injection through the proxy_client.asp function. By manipulating parameters such as proxy_srv, proxy_srvport, proxy_lanip, and proxy_lanport, attackers may gain the ability to execute arbitrary commands on the affected device, potentially compromising security and network integrity. This vulnerability poses a significant threat to users of the device, necessitating prompt updates and mitigations.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.