Vulnerability Description
A command injection vulnerability in the firmware_update command, in the device's restricted telnet interface, allows an authenticated attacker to execute arbitrary commands as root.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dwl-2600Ap Firmware | 4.2.0.17 |
| Dlink | Dwl-2600Ap | - |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2023-1ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2023-1ExploitThird Party Advisory
FAQ
What is CVE-2023-0127?
CVE-2023-0127 is a vulnerability with a CVSS score of 7.8 (HIGH). A command injection vulnerability in the firmware_update command, in the device's restricted telnet interface, allows an authenticated attacker to execute arbitrary commands as root.
How severe is CVE-2023-0127?
CVE-2023-0127 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0127?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dwl-2600Ap Firmware, Dlink Dwl-2600Ap.