First published: Tue May 14 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the executeWmicCmd method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link D-View |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-448 is considered high due to the potential for remote code execution.
To fix ZDI-24-448, ensure that you apply the latest security patch provided by D-Link for D-View.
ZDI-24-448 affects specific versions of D-Link D-View that are vulnerable to this code execution flaw.
No, ZDI-24-448 requires authentication, but the authentication mechanism can be bypassed by attackers.
ZDI-24-448 can lead to remote attacks enabling arbitrary code execution on affected installations.