First published: Thu May 08 2025(Updated: )
An issue in dlink DNS-320 v.1.00 and DNS-320LW v.1.01.0914.20212 allows an attacker to execute arbitrary via the account_mgr.cgi->cgi_chg_admin_pw components.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DNS-320 Storage Device | ||
D-Link DNS-320LW Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-44023 is classified as a critical severity vulnerability due to its potential for remote code execution.
To fix CVE-2025-44023, upgrade your D-Link DNS-320 or DNS-320LW devices to the latest firmware version provided by D-Link.
CVE-2025-44023 affects D-Link DNS-320 version 1.00 and DNS-320LW version 1.01.0914.20212.
CVE-2025-44023 can facilitate arbitrary code execution attacks, allowing attackers to take control of affected devices.
Currently, there are no recommended workarounds for CVE-2025-44023 other than applying the firmware updates.