First published: Sat Feb 11 2023(Updated: )
A command injection vulnerability in the firmware_update command, in the device's restricted telnet interface, allows an authenticated attacker to execute arbitrary commands as root.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dwl-2600ap Firmware | =4.2.0.17 | |
Dlink Dwl-2600ap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0127 is classified as high due to its potential for remote command execution by an authenticated attacker.
To fix CVE-2023-0127, update the Dlink DWL-2600AP firmware to the latest version provided by the vendor.
CVE-2023-0127 affects devices running the Dlink DWL-2600AP firmware version 4.2.0.17.
CVE-2023-0127 allows an authenticated attacker to execute arbitrary commands as root, leading to full system compromise.
CVE-2023-0127 is not exploitable remotely as it requires authenticated access through the device's restricted telnet interface.