On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can forge an HTTP request to inject operating system commands that can be executed on the device with higher privileges, aka remote code execution.
References
Link | Resource |
---|---|
https://fortiguard.com/zeroday/FG-VD-18-060 | Third Party Advisory |
https://fortiguard.com/zeroday/FG-VD-18-060 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/zeroday/FG-VD-18-060 - Third Party Advisory |
Information
Published : 2018-05-18 14:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10967
Mitre link : CVE-2018-10967
CVE.ORG link : CVE-2018-10967
JSON object : View
Products Affected
dlink
- dir-604m
- dir-550a
d-link
- dir-550a_firmware
- dir-604m_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')