説明
A security flaw has been discovered in D-Link DI-7400G+ 19.12.25A1. Affected is the function sub_478D28 of the file /mng_platform.asp. The manipulation of the argument addr with the input `echo 12345 > poc.txt` results in command injection. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited.
AI分析AIによる分析
影響を受ける製品
dlinkdi-7400g\+_firmware
19.12.25a1
dlinkdi-7400g\+
v2.a1
参照
- https://github.com/xyh4ck/iot_pocExploitThird Party Advisory
- https://github.com/xyh4ck/iot_poc#vulnerability-verification-processExploitThird Party Advisory
- https://vuldb.com/?ctiid.322069Permissions RequiredVDB Entry
- https://vuldb.com/?id.322069Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.640779Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
- https://github.com/xyh4ck/iot_pocExploitThird Party Advisory
- https://github.com/xyh4ck/iot_poc#vulnerability-verification-processExploitThird Party Advisory