First published: Fri Jul 19 2024(Updated: )
D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router v21_D240126 was discovered to contain a remote code execution (RCE) vulnerability in the ntp_zone_val parameter at /goform/set_ntp. This vulnerability is exploited via a crafted HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-823X AX3000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39962 is rated as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-39962, update your D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router to the latest firmware provided by D-Link.
Exploiting CVE-2024-39962 can allow an attacker to execute arbitrary code on the affected router, compromising its integrity and security.
Yes, CVE-2024-39962 can be exploited remotely through a crafted HTTP request targeting the ntp_zone_val parameter.
CVE-2024-39962 specifically affects the D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router.