First published: Thu Oct 17 2024(Updated: )
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the MacAddress parameter in the SetMACFilters2 function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-882 Firmware | ||
D-Link DIR-878 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48630 is classified as a medium-severity command injection vulnerability.
To mitigate CVE-2024-48630, update your D-Link DIR-882 or DIR-878 firmware to the latest version.
The affected devices include the D-Link DIR-882 and DIR-878 models.
CVE-2024-48630 is a command injection vulnerability that allows remote command execution.
CVE-2024-48630 exploits the vulnerability through a crafted POST request targeting the MacAddress parameter in the SetMACFilters2 function.