First published: Thu Oct 17 2024(Updated: )
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the key parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-882 Firmware | ||
D-Link DIR-878 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48634 is classified as a high severity vulnerability due to the potential for arbitrary command execution.
To fix CVE-2024-48634, update the D-Link DIR-882 and DIR-878 devices to the latest firmware versions provided by D-Link.
CVE-2024-48634 allows an attacker to execute arbitrary OS commands on the affected D-Link routers, potentially compromising the device.
Yes, specific versions of D-Link DIR-882 (DIR_882_FW130B06) and DIR-878 (DIR_878_FW130B08) are identified as vulnerable to CVE-2024-48634.
CVE-2024-48634 can be exploited via a crafted POST request that includes malicious input, leading to command injection.