First published: Fri May 18 2018(Updated: )
On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can forge an HTTP request to inject operating system commands that can be executed on the device with higher privileges, aka remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-550a Firmware | <=2.10kr | |
Dlink Dir-550a | ||
D-link Dir-604m Firmware | <=2.10kr | |
Dlink Dir-604m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10967 has a critical severity level due to the potential for remote code execution.
To fix CVE-2018-10967, you should update the firmware of the D-Link DIR-550A and DIR-604M devices to a version later than 2.10KR.
CVE-2018-10967 affects D-Link DIR-550A and DIR-604M devices running firmware version up to and including 2.10KR.
CVE-2018-10967 enables an attacker to forge HTTP requests that can lead to remote code execution on the vulnerable devices.
CVE-2018-10967 can be exploited by a malicious user with network access to the affected D-Link devices.