First published: Wed Jun 28 2023(Updated: )
D-Link DSL-224 firmware version 3.0.10 allows post authentication command execution via an unspecified method.
Credit: cna@cyber.gov.il cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSL-224 | =3.0.10 | |
D-Link DSL-224 | ||
All of | ||
D-Link DSL-224 | =3.0.10 | |
D-Link DSL-224 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32223 is classified as a medium severity vulnerability due to its ability to allow post-authentication command execution.
To remediate CVE-2023-32223, it is recommended to update the D-Link DSL-224 firmware to the latest version that addresses this vulnerability.
CVE-2023-32223 affects D-Link DSL-224 devices running firmware version 3.0.10.
CVE-2023-32223 permits authenticated users to execute arbitrary commands on the affected D-Link DSL-224 device.
While there is currently no public exploit available for CVE-2023-32223, the potential for exploit exists, making it crucial to apply security updates.