First published: Wed Oct 04 2023(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability. The specific flaw exists within the coreservice_action_script action. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link D-View |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-19573 is high due to the risk of remote code execution without authentication.
To remediate ZDI-CAN-19573, update to the latest patched version of D-Link D-View provided by the vendor.
Users of D-Link D-View installations are affected by ZDI-CAN-19573.
Yes, ZDI-CAN-19573 can be exploited remotely as it does not require authentication.
The vector of attack for ZDI-CAN-19573 involves the coreservice_action_script action which can be manipulated to execute arbitrary code.