Логотип exploitDog
bind:CVE-2025-10634
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-10634

Количество 3

Количество 3

nvd логотип

CVE-2025-10634

5 месяцев назад

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-hq6r-hhqx-wvqf

5 месяцев назад

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2025-12537

5 месяцев назад

Уязвимость функции sub_412E7C() файла /usr/sbin/goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-823X , позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-10634

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-hq6r-hhqx-wvqf

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-12537

Уязвимость функции sub_412E7C() файла /usr/sbin/goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-823X , позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
0%
Низкий
5 месяцев назад

Уязвимостей на страницу