First published: Thu May 16 2024(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000-40 V31R02B1413C and classified as critical. This issue affects some unknown processing of the file /useratte/resmanage.php. The manipulation of the argument load leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264533 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAR-7000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4965 is classified as a critical vulnerability.
CVE-2024-4965 is an OS command injection vulnerability.
To fix CVE-2024-4965, update your D-Link DAR-7000-40 device to the latest firmware version.
CVE-2024-4965 affects the D-Link DAR-7000-40 V31R02B1413C device's handling of the /useratte/resmanage.php file.
Yes, CVE-2024-4965 can be exploited remotely due to the command injection vulnerability.