First published: Thu May 04 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-2640-US Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-19546 has a high severity rating due to its ability to allow arbitrary code execution without authentication.
To fix ZDI-CAN-19546, update your D-Link DIR-2640 router firmware to the latest version provided by D-Link.
ZDI-CAN-19546 affects users of D-Link DIR-2640 routers, specifically those with vulnerable firmware versions.
The attack vector for ZDI-CAN-19546 is network-adjacent attackers who can exploit the vulnerability without needing any authentication.
No, authentication is not required to exploit the ZDI-CAN-19546 vulnerability.