First published: Sun Sep 24 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 up to 20151231. This issue affects some unknown processing of the file /log/webmailattach.php. The manipulation of the argument table_name leads to an unknown weakness. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240239. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dar-7000 Firmware | <=20151231 | |
Dlink Dar-7000 | ||
All of | ||
<=20151231 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5143 is critical.
The D-Link DAR-7000 firmware up to version 20151231 is affected by CVE-2023-5143.
CVE-2023-5143 can be exploited through manipulation of the argument "table_name" in the file /log/webmailattach.php.
No, the default installation of D-Link DAR-7000 is not vulnerable to CVE-2023-5143.
You can find more information about CVE-2023-5143 at the following references: [reference 1](https://github.com/ggg48966/cve/blob/main/D-LINK%20-DAR-7000_rce_%20webmailattach.md), [reference 2](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10354), [reference 3](https://vuldb.com/?ctiid.240239).