First published: Tue Nov 23 2021(Updated: )
OS Command Injection vulnerability in debug_fcgi of D-Link DWR-932C E1 firmware allows a remote attacker to perform command injection via a crafted HTTP request.
Credit: cve_disclosure@tech.gov.sg cve_disclosure@tech.gov.sg
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DWR-932C | <=1.0.0.4 | |
D-Link DWR-932C | =revision_e | |
All of | ||
D-Link DWR-932C | <=1.0.0.4 | |
D-Link DWR-932C | =revision_e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42784 is a critical severity OS Command Injection vulnerability allowing remote code execution through crafted HTTP requests.
To fix CVE-2021-42784, update the D-Link DWR-932C E1 firmware to versions later than 1.0.0.4.
CVE-2021-42784 affects the D-Link DWR-932C E1 firmware version 1.0.0.4 and earlier.
Yes, CVE-2021-42784 can be exploited remotely by sending specially crafted HTTP requests.
The potential impacts of CVE-2021-42784 include unauthorized access and full system compromise due to command injection.