Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9rj5-x938-cmcg

Опубликовано: 30 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the argument flag/cmd/iface leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the argument flag/cmd/iface leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 26%
0.00085
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 6.3
nvd
около 2 месяцев назад

A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the argument flag/cmd/iface leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
fstec
около 2 месяцев назад

Уязвимость микропрограммного обеспечения маршрутизаторов D-Link DI-7300G+ и DI-8200G, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 26%
0.00085
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-77