First published: Thu Oct 17 2024(Updated: )
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SubnetMask parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-882 Firmware | ||
D-Link DIR-878 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48638 is classified as a high severity command injection vulnerability affecting D-Link DIR-882 and DIR-878 routers.
To mitigate CVE-2024-48638, update your D-Link DIR-882 or DIR-878 router to the latest firmware version provided by D-Link.
CVE-2024-48638 allows attackers to execute arbitrary OS commands, potentially leading to unauthorized access or control of the affected devices.
CVE-2024-48638 affects the D-Link DIR-882 with firmware version FW130B06 and the DIR-878 with firmware version FW130B08.
While there is no public information indicating active exploitation, it is advisable to address CVE-2024-48638 promptly due to its potential risks.