First published: Fri Jan 12 2018(Updated: )
diag_ping.cmd on D-Link DSL-2640U devices with firmware IM_1.00 and ME_1.00, and DSL-2540U devices with firmware ME_1.00, allows authenticated remote attackers to execute arbitrary OS commands via shell metacharacters in the ipaddr field of an HTTP GET request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dsl-2540u Firmware | =me_1.00 | |
Dlink Dsl-2540u | ||
D-link Dsl-2640u Firmware | =im_1.00 | |
D-link Dsl-2640u Firmware | =me_1.00 | |
Dlink Dsl-2640u | ||
All of | ||
D-link Dsl-2540u Firmware | =me_1.00 | |
Dlink Dsl-2540u | ||
All of | ||
Any of | ||
D-link Dsl-2640u Firmware | =im_1.00 | |
D-link Dsl-2640u Firmware | =me_1.00 | |
Dlink Dsl-2640u |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.