First published: Fri Jan 27 2023(Updated: )
D-Link DIR_878_FW1.30B08 was discovered to contain a command injection vulnerability via the component /SetNetworkSettings/SubnetMask. This vulnerability allows attackers to escalate privileges to root via a crafted payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-878 firmware | =1.30b08 | |
D-Link DIR-878 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48108 has a high severity due to its potential for privilege escalation to root.
To fix CVE-2022-48108, upgrade the D-Link DIR-878 firmware to the latest version provided by D-Link.
The impact of CVE-2022-48108 includes unauthorized access and control over the affected D-Link router.
Users of the D-Link DIR-878 with firmware version 1.30b08 are affected by CVE-2022-48108.
The vulnerable component in CVE-2022-48108 is the /SetNetworkSettings/SubnetMask path.