An OS command injection vulnerability in D-Link DIR-823G firmware version 1.02B05 allows unauthorized attackers to execute arbitrary operating system commands via a crafted GET request to EXCU_SHELL.
References
Link | Resource |
---|---|
https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-06-29T00:00:00
Updated: 2023-07-06T00:00:00
Reserved: 2023-02-27T00:00:00
Link: CVE-2023-26613
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-06-29T16:15:09.580
Modified: 2023-07-06T18:46:03.530
Link: CVE-2023-26613
JSON object: View
Redhat Information
No data.
CWE