8.8

CVE-2024-44333

D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by sending a carefully crafted malicious string to the CGI function responsible for handling usb_paswd.asp.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendordlink
Product di-7300g\+v2_firmware
Default Statusunknown
Version 24.04.18D1
Status affected
Vendordlink
Product di-7400g\+v2_firmware
Default Statusunknown
Version 24.04.18D1
Status affected
Vendordlink
Product di-7003gv2_firmware
Default Statusunknown
Version 24.04.18D1
Status affected
Vendordlink
Product di-7100g\+v2_firmware
Default Statusunknown
Version 24.04.18D1
Status affected
Vendordlink
Product di-7100gv2_firmware
Default Statusunknown
Version 24.04.18D1
Status affected
Vendordlink
Product di-7200gv2_firmware
Default Statusunknown
Version 24.04.18D1
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.12% 0.323
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.