An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function.
References
Link | Resource |
---|---|
http://dir-816a2.com | Broken Link |
https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md | Exploit Third Party Advisory |
https://www.dlink.com/ | Product |
https://www.dlink.com/en/security-bulletin/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2024-02-08 18:15
Updated : 2024-02-15 05:02
NVD link : CVE-2024-24321
Mitre link : CVE-2024-24321
CVE.ORG link : CVE-2024-24321
JSON object : View
Products Affected
dlink
- dir-816
- dir-816_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')