First published: Thu Oct 17 2024(Updated: )
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-882 Firmware | ||
D-Link DIR-878 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48631 is considered a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2024-48631, update your D-Link DIR-882 or DIR-878 device to the latest firmware version provided by the manufacturer.
CVE-2024-48631 is caused by improper validation of the SSID parameter in the SetWLanRadioSettings function, allowing for command injection.
The affected D-Link devices for CVE-2024-48631 include the DIR-882 with firmware version FW130B06 and DIR-878 with firmware version FW130B08.
Yes, CVE-2024-48631 is remotely exploitable via crafted POST requests over the network.