First published: Mon Sep 09 2024(Updated: )
D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution due to insufficient parameter filtering in the CGI handling function of upgrade_filter.asp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DI-7003GV2 | ||
D-Link DI-7100G | ||
D-Link DI-7100G+V2 | ||
D-Link DI-7200gv2 Firmware | ||
D-Link DI-7300G+V2 | ||
D-Link DI-7400G+V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44334 is considered critical due to its potential to allow remote command execution.
To fix CVE-2024-44334, update the firmware of affected D-Link devices to the latest version provided by the vendor.
CVE-2024-44334 affects D-Link DI-7003GV2, DI-7100G+V2, DI-7100GV2, DI-7200GV2, DI-7300G+V2, and DI-7400G+V2.
CVE-2024-44334 is a remote command execution vulnerability caused by insufficient parameter filtering.
Yes, CVE-2024-44334 can be exploited remotely by attackers to execute arbitrary commands on vulnerable devices.