CVE-2023-26613

An OS command injection vulnerability in D-Link DIR-823G firmware version 1.02B05 allows unauthorized attackers to execute arbitrary operating system commands via a crafted GET request to EXCU_SHELL.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-823g_firmware:1.02b05:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*

History

06 Jul 2023, 18:46

Type Values Removed Values Added
CPE cpe:2.3:o:dlink:dir-823g_firmware:1.02b05:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*
References (MISC) https://www.dlink.com/en/security-bulletin/ - (MISC) https://www.dlink.com/en/security-bulletin/ - Vendor Advisory
References (MISC) https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell - (MISC) https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell - Exploit, Third Party Advisory
CWE CWE-78
First Time Dlink dir-823g
Dlink
Dlink dir-823g Firmware
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

06 Jul 2023, 17:15

Type Values Removed Values Added
Summary An OS command injection vulnerability in D-Link DIR-823G firmware version 1.02B05 allows unauthorized attackers to execute arbitrary operating system commands via a crafted get request to excu_shel. An OS command injection vulnerability in D-Link DIR-823G firmware version 1.02B05 allows unauthorized attackers to execute arbitrary operating system commands via a crafted GET request to EXCU_SHELL.

29 Jun 2023, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-29 16:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-26613

Mitre link : CVE-2023-26613

CVE.ORG link : CVE-2023-26613


JSON object : View

Products Affected

dlink

  • dir-823g
  • dir-823g_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')