First published: Mon Mar 09 2020(Updated: )
setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dcs-930l Firmware | <2.12 | |
Dlink Dcs-930l | ||
D-Link DCS-930L devices | ||
All of | ||
Dlink Dcs-930l Firmware | <2.12 | |
Dlink Dcs-930l |
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-11021 is a vulnerability that allows a remote attacker to execute code via an OS command injection in D-Link DCS-930L devices before version 2.12.
CVE-2016-11021 has a severity score of 7.2 (critical).
D-Link DCS-930L devices before version 2.12 are affected by CVE-2016-11021.
An attacker can exploit CVE-2016-11021 by sending a malicious OS command in the SystemCommand parameter.
Yes, the vulnerability can be fixed by updating D-Link DCS-930L devices to version 2.12 or later.