First published: Tue Nov 05 2024(Updated: )
D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the Address parameter in the SetNetworkTomographySettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-823 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-51023 is considered high due to its potential for remote command execution.
To fix CVE-2024-51023, update the D-Link DIR-823G to the latest firmware version provided by the manufacturer.
CVE-2024-51023 affects the D-Link DIR-823G router with firmware version 1.0.2B05.
CVE-2024-51023 can allow attackers to execute arbitrary operating system commands on the affected device.
Yes, CVE-2024-51023 is exploitable remotely through crafted requests targeting the vulnerable router.