First published: Thu Aug 01 2024(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-600 up to 2.18. It has been rated as critical. This issue affects the function soapcgi_main of the file /soap.cgi. The manipulation of the argument service leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273329 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-600L | <=2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7357 is rated as critical due to its potential for OS command injection.
CVE-2024-7357 allows an attacker to manipulate the 'service' argument in the /soap.cgi file, leading to OS command injection.
CVE-2024-7357 affects D-Link DIR-600 routers running version 2.18 and earlier.
Yes, CVE-2024-7357 can be exploited remotely, enabling attackers to execute commands on the D-Link DIR-600.
To mitigate CVE-2024-7357, it is recommended to upgrade the D-Link DIR-600 firmware to the latest version or apply security patches as they become available.