First published: Fri Feb 04 2022(Updated: )
D-Link device D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via the tomography_ping_address, tomography_ping_number, tomography_ping_size, tomography_ping_timeout, and tomography_ping_ttl parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-823 Pro Firmware | <=1.0.2 | |
Dlink Dir-823 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46452 is classified as a high-severity vulnerability, allowing command injection.
To mitigate CVE-2021-46452, update the D-Link DIR-823 Pro firmware to the latest version beyond 1.0.2.
CVE-2021-46452 affects D-Link DIR-823 Pro devices running firmware version 1.0.2 or earlier.
CVE-2021-46452 allows attackers to execute arbitrary commands on the affected D-Link devices.
CVE-2021-46452 is a remote vulnerability that can be exploited over the network by an attacker.