First published: Fri Feb 04 2022(Updated: )
D-Link device DI-7200GV2.E1 v21.04.09E1 was discovered to contain a command injection vulnerability in the function upgrade_filter. This vulnerability allows attackers to execute arbitrary commands via the path and time parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Di-7200gv2 Firmware | <=21.04.09e1 | |
Dlink Di-7200gv2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46230 has a high severity due to its potential for arbitrary command execution.
To fix CVE-2021-46230, upgrade to a firmware version later than 21.04.09E1 for the D-Link DI-7200GV2 device.
CVE-2021-46230 specifically affects the D-Link DI-7200GV2 firmware version 21.04.09E1 and below.
Yes, CVE-2021-46230 can be exploited remotely by attackers who know how to send crafted requests.
CVE-2021-46230 affects the upgrade_filter function, allowing command injection through path and time parameters.