D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command injection vulnerability in the function pcap_download_handler. This vulnerability allows attackers to execute arbitrary commands via the update.device.packet-capture.tftp-file-name parameter.
References
| Link | Resource |
|---|---|
| https://github.com/Archerber/bug_submit/blob/main/D-Link/DWL-6610/bug4.md | Exploit Third Party Advisory |
| https://github.com/Archerber/bug_submit/blob/main/D-Link/DWL-6610/bug4.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 08:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Archerber/bug_submit/blob/main/D-Link/DWL-6610/bug4.md - Exploit, Third Party Advisory |
25 Sep 2024, 01:36
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-09-20 14:15
Updated : 2024-11-21 08:23
NVD link : CVE-2023-43202
Mitre link : CVE-2023-43202
CVE.ORG link : CVE-2023-43202
JSON object : View
Products Affected
dlink
- dwl-6610ap_firmware
- dwl-6610ap
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
