OS Command Injection Vulnerability in D-Link DIR-600 Router
CVE-2024-7357

Currently unrated

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
1 August 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A significant OS command injection vulnerability has been identified in the D-Link DIR-600 router, specifically affecting versions up to 2.18. This vulnerability arises from improper handling of the 'service' argument in the soapcgi_main function located in the /soap.cgi file. Attackers may exploit this vulnerability remotely, allowing them to execute arbitrary commands on the affected system. It is critical to note that this issue is only present in devices that have reached their end-of-life and are no longer supported by D-Link. Users are strongly advised to replace the affected devices to mitigate potential security threats. For more detailed insights and remediation options, refer to the relevant references and advisories.

Affected Version(s)

DIR-600 2.0

DIR-600 2.1

DIR-600 2.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

BeaCox (VulDB User)
.