First published: Mon Apr 22 2024(Updated: )
Cross Site Scripting vulnerability in D-Link DAP products DAP-2230, DAP-2310, DAP-2330, DAP-2360, DAP-2553, DAP-2590, DAP-2690, DAP-2695, DAP-3520, DAP-3662 allows a remote attacker to execute arbitrary code via the reload parameter in the session_login.php component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-2230 | ||
D-Link DAP-2310 | ||
D-Link DAP-2330 | ||
D-Link DAP-2360 | ||
D-Link DAP-2553 H/W A1 Firmware | ||
D-Link DAP-2590 | ||
D-Link DAP-2690 | ||
D-Link DAP-2695 | ||
D-Link DAP-3520 H/W A1 | ||
D-Link DAP-3662 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28436 is classified as a high severity cross site scripting vulnerability.
To fix CVE-2024-28436, upgrade to the latest firmware provided by D-Link for your affected DAP product.
D-Link DAP-2230, DAP-2310, DAP-2330, DAP-2360, DAP-2553, DAP-2590, DAP-2690, DAP-2695, DAP-3520, and DAP-3662 are all affected by CVE-2024-28436.
CVE-2024-28436 allows a remote attacker to execute arbitrary code via the reload parameter in the session_login.php component.
As of now, details on publicly accessible exploits for CVE-2024-28436 have not been disclosed.