Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w27p-m7fr-3hpc

Опубликовано: 25 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 4.7

Описание

A vulnerability, which was classified as critical, has been found in D-Link DIR-823X 240126/240802. This issue affects the function sub_41710C of the file /goform/diag_nslookup of the component HTTP POST Request Handler. The manipulation of the argument target_addr leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, has been found in D-Link DIR-823X 240126/240802. This issue affects the function sub_41710C of the file /goform/diag_nslookup of the component HTTP POST Request Handler. The manipulation of the argument target_addr leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 78%
0.01186
Низкий

5.1 Medium

CVSS4

4.7 Medium

CVSS3

Дефекты

CWE-77
CWE-78

Связанные уязвимости

CVSS3: 4.7
nvd
11 месяцев назад

A vulnerability, which was classified as critical, has been found in D-Link DIR-823X 240126/240802. This issue affects the function sub_41710C of the file /goform/diag_nslookup of the component HTTP POST Request Handler. The manipulation of the argument target_addr leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 4.7
fstec
11 месяцев назад

Уязвимость функции sub_41710C (/goform/diag_nslookup) микропрограммного обеспечения маршрутизатора D-Link DIR-823X AX3000, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 78%
0.01186
Низкий

5.1 Medium

CVSS4

4.7 Medium

CVSS3

Дефекты

CWE-77
CWE-78