First published: Thu Dec 13 2012(Updated: )
The restricted telnet shell on the D-Link DSL2730U router allows remote authenticated users to bypass intended command restrictions via shell metacharacters that follow a whitelisted command.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dsl-2730e Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5966 is considered a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2012-5966, update the D-Link DSL2730U router firmware to the latest version provided by D-Link.
Users of the D-Link DSL2730U router are affected by CVE-2012-5966, specifically those allowing remote authenticated access.
CVE-2012-5966 allows remote authenticated users to bypass command restrictions, potentially leading to unauthorized command execution.
Yes, CVE-2012-5966 is exploitable over the internet if remote access is enabled on the D-Link DSL2730U router.