First published: Wed Sep 20 2023(Updated: )
D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command injection vulnerability in the function pcap_download_handler. This vulnerability allows attackers to execute arbitrary commands via the update.device.packet-capture.tftp-file-name parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dwl-6610ap Firmware | =4.3.0.8b003c | |
Dlink Dwl-6610ap | ||
All of | ||
Dlink Dwl-6610ap Firmware | =4.3.0.8b003c | |
Dlink Dwl-6610ap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this D-LINK DWL-6610 firmware is CVE-2023-43202.
The severity level of CVE-2023-43202 is critical.
The affected software version for this vulnerability is D-LINK DWL-6610 FW_v_4.3.0.8B003C.
The vulnerability allows attackers to execute arbitrary commands through the update.device.packet-capture.tftp-file-name parameter.
Yes, it is recommended to update the D-LINK DWL-6610 firmware to a patched version to fix this vulnerability.