First published: Mon May 15 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-2150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-633 is considered critical due to the potential for arbitrary code execution.
Mitigation for ZDI-23-633 involves applying the latest firmware updates from D-Link for the DIR-2150 router.
ZDI-23-633 affects users of the D-Link DIR-2150 router that can be exploited by network-adjacent attackers.
ZDI-23-633 allows attackers to bypass authentication and execute arbitrary code on the router.
Although authentication is required, the vulnerability can be exploited without user interaction as the authentication mechanism can be bypassed.