First published: Mon Sep 09 2024(Updated: )
D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by sending a carefully crafted malicious string to the CGI function responsible for handling usb_paswd.asp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DI-7003GV2 | ||
D-Link DI-7100G | ||
D-Link DI-7100G+V2 | ||
D-Link DI-7200gv2 Firmware | ||
D-Link DI-7300G+V2 | ||
D-Link DI-7400G+V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44333 has a high severity rating due to its potential for remote command execution.
To fix CVE-2024-44333, update your D-Link devices to the latest firmware version provided by D-Link.
CVE-2024-44333 affects several D-Link models including DI-7003GV2, DI-7100G+V2, DI-7100GV2, DI-7200GV2, DI-7300G+V2, and DI-7400G+V2.
Yes, CVE-2024-44333 can be exploited remotely by attackers through crafted malicious strings.
Exploitation of CVE-2024-44333 could allow attackers to execute arbitrary commands on the affected D-Link devices.