First published: Thu May 04 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1360 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-23-536 has a high severity rating due to its potential for arbitrary code execution by network-adjacent attackers.
To fix ZDI-23-536, update the D-Link DAP-1360 router firmware to the latest version provided by D-Link.
Users of D-Link DAP-1360 routers are affected by ZDI-23-536 if their device is running an exploitable firmware version.
ZDI-23-536 can be exploited to allow network-adjacent attackers to execute arbitrary code on the vulnerable router.
No, authentication is not required to exploit ZDI-23-536, making it particularly dangerous.