First published: Wed May 24 2023(Updated: )
This vulnerability allows remote attackers to create and delete arbitrary files on affected installations of D-Link D-View. Authentication is required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link D-View |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-19529 is high, as it allows remote attackers to create and delete arbitrary files.
To fix ZDI-CAN-19529, ensure your D-Link D-View installation is updated with the latest security patches provided by the vendor.
The potential impacts of ZDI-CAN-19529 include unauthorized file manipulation, leading to data loss or breach of confidentiality.
Users of D-Link D-View software who have not applied the necessary security updates may be affected by ZDI-CAN-19529.
Yes, ZDI-CAN-19529 requires authentication, meaning an attacker must have valid credentials to exploit the vulnerability.