First published: Mon Sep 09 2024(Updated: )
D-Link DI-7003G v19.12.24A1, DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution (RCE) via version_upgrade.asp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DI-7003G | ||
D-Link DI-7003GV2 | ||
D-Link DI-7100G | ||
D-Link DI-7100G+V2 | ||
D-Link DI-7200gv2 Firmware | ||
D-Link DI-7300G+V2 | ||
D-Link DI-7400G+V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44335 is classified as a high-severity vulnerability due to its potential for remote command execution.
To fix CVE-2024-44335, update the affected D-Link devices to the latest firmware version provided by the vendor.
CVE-2024-44335 affects D-Link models including DI-7003G, DI-7003GV2, DI-7100G+V2, DI-7100GV2, DI-7200GV2, DI-7300G+V2, and DI-7400G+V2.
CVE-2024-44335 is a remote command execution vulnerability that allows attackers to execute arbitrary commands on the affected devices.
You can verify vulnerability to CVE-2024-44335 by checking the firmware version of your D-Link device against the listed affected versions.