Remote Code Execution Flaw in D-Link G416 Router HTTP Service
CVE-2023-50216
8.8HIGH
What is CVE-2023-50216?
The D-Link G416 router is susceptible to a command injection vulnerability stemming from inadequate validation of user-supplied input in its HTTP service, which operates on TCP port 80. This flaw allows attackers who are on the same network to execute arbitrary code without requiring authentication. By exploiting this vulnerability, an attacker can gain root access, leading to potential unauthorized control over the affected device, which could result in a serious breach of network security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
G416 1.08b02
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published