Command Injection Vulnerability in D-Link DI-7200GV2.E1
CVE-2021-46232
9.8CRITICAL
Summary
The D-Link DI-7200GV2.E1 device is susceptible to a command injection vulnerability in its version_upgrade.asp function. By manipulating the path parameter, an attacker could potentially execute arbitrary commands on the affected device, leading to unauthorized actions and a compromise of system integrity. It is important for users to apply security updates and follow best practices to mitigate the risk associated with this vulnerability.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved