First published: Thu Mar 16 2023(Updated: )
D-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-820L Firmware | ||
D-Link DIR-820L Firmware | =105b03 | |
dlink DIR820LA1 firmware | ||
All of | ||
D-Link DIR-820L Firmware | =105b03 | |
dlink DIR820LA1 firmware | ||
All of | ||
=105b03 | ||
The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25280 is considered a high severity vulnerability due to its potential for remote code execution and privilege escalation.
To fix CVE-2023-25280, users should update their D-Link DIR-820 router to the latest firmware version provided by D-Link.
CVE-2023-25280 affects D-Link DIR-820 routers running firmware version 105b03.
CVE-2023-25280 is an OS command injection vulnerability that allows unauthenticated remote attackers to execute arbitrary commands.
The attack vector for CVE-2023-25280 involves sending a crafted payload to the ping_addr parameter of the ping.ccp endpoint.