CWE
77 78
Advisory Published
Updated

CVE-2024-48636: Command Injection

First published: Thu Oct 17 2024(Updated: )

D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:0/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
D-Link DIR-882 Firmware
D-Link DIR-878

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-48636?

    CVE-2024-48636 is classified as a high-severity command injection vulnerability.

  • How do I fix CVE-2024-48636?

    To fix CVE-2024-48636, update the firmware of your D-Link DIR-882 or DIR-878 router to the latest version provided by the manufacturer.

  • What devices are affected by CVE-2024-48636?

    CVE-2024-48636 affects the D-Link DIR-882 and DIR-878 routers.

  • What can attackers do with CVE-2024-48636?

    Attackers can execute arbitrary OS commands on affected devices via a crafted POST request due to CVE-2024-48636.

  • Is CVE-2024-48636 remote or local exploit?

    CVE-2024-48636 can be exploited remotely by sending a malicious POST request.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203