D-Link DI-8300 vulnerable to command injection
CVE-2024-44410
9.8CRITICAL
Summary
The D-Link DI-8300 router, specifically version 16.07.26A1, is susceptible to a command injection vulnerability through its upgrade_filter_asp function. This flaw enables attackers to execute arbitrary commands on the device, potentially leading to unauthorized access and control. Exploiting this vulnerability could compromise the integrity and availability of the affected systems, making it essential for users to apply the necessary security measures and updates.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved