Command Injection Vulnerability in D-Link DI-7200GV2.E1 Devices
CVE-2021-46230
9.8CRITICAL
Summary
A command injection vulnerability exists in D-Link's DI-7200GV2.E1 device, specifically in the upgrade_filter function. This flaw permits attackers to send crafted requests that include malicious path and time parameters, allowing them to execute arbitrary code on the affected device. It's imperative for users to evaluate their devices and apply necessary patches to mitigate potential exploitation.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved