First published: Tue Dec 22 2020(Updated: )
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It contains an execute_cmd.cgi feature (that is not reachable via the web user interface) that lets an authenticated user execute Operating System commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dsl2888a Firmware | <au_2.31_v1.1.47ae55 | |
Dlink Dsl2888a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24581 is considered a high-severity vulnerability due to its capability of allowing authenticated users to execute arbitrary Operating System commands.
To mitigate CVE-2020-24581, upgrade your D-Link DSL-2888A firmware to version AU_2.31_V1.1.47ae55 or later.
Users of D-Link DSL-2888A devices running firmware prior to AU_2.31_V1.1.47ae55 are affected by CVE-2020-24581.
CVE-2020-24581 can be exploited through the execute_cmd.cgi feature, which requires user authentication to access.
Yes, a patch is available in the form of a firmware update to AU_2.31_V1.1.47ae55 or subsequent versions.