First published: Thu Oct 17 2024(Updated: )
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the IPAddress parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-882 Firmware | ||
D-Link DIR-878 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48629 is classified as a high severity vulnerability due to its potential to allow arbitrary command execution.
To fix CVE-2024-48629, update your D-Link DIR-882 and DIR-878 routers to the latest firmware version provided by D-Link.
CVE-2024-48629 affects the D-Link DIR-882 with firmware version 130B06 and D-Link DIR-878 with firmware version 130B08.
CVE-2024-48629 is a command injection vulnerability that allows attackers to execute arbitrary OS commands.
CVE-2024-48629 can be exploited by sending a crafted POST request that manipulates the IPAddress parameter in the SetGuestZoneRouterSettings function.