An issue in D-Link DSL-3782 v.1.03 allows remote authenticated users to execute arbitrary code as root
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2023-27216 | 12 Apr 202300:00 | – | cvelist |
![]() | CVE-2023-27216 | 12 Apr 202300:00 | – | vulnrichment |
![]() | CVE-2023-27216 | 12 Apr 202317:15 | – | nvd |
![]() | Code injection | 12 Apr 202317:15 | – | prion |
![]() | CVE-2023-27216 | 23 May 202502:27 | – | redhatcve |
![]() | Exploit for OS Command Injection in Dlink Dsl-3782 Firmware | 9 Aug 202410:05 | – | githubexploit |
Source | Link |
---|---|
dlink | www.dlink.com/en/security-bulletin/ |
lessonsec | www.lessonsec.com/cve/cve-2023-27216/ |
d-link | www.d-link.com/ |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
lan_ip1 | request body | /cfg_manager | Exploitable endpoint that allows an attacker to perform command injection via a network settings page by injecting a reverse shell command. | CWE-78 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo