'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-07-29 | |
| Rule Name: | D-Link IPAddress Parameter Command Execution Vulnerability | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | D-Link, a leading global manufacturer of network equipment, provides network equipment and solutions.Certain D-Link router models (such as DIR-823G) have a command execution vulnerability. Attackers can inject and execute arbitrary commands via the IPAddress parameter, allowing them to take control of the device. | |
| Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Please contact the software vendor to update the software patch. |