Vulnerability Description
A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Di-8100 Firmware | 16.07 |
| Dlink | Di-8100 | - |
Related Weaknesses (CWE)
References
- https://github.com/aLtEr6/pdf/blob/main/3.pdfBroken Link
- https://vuldb.com/?ctiid.274731Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.274731Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.385338Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-7833?
CVE-2024-7833 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument pat...
How severe is CVE-2024-7833?
CVE-2024-7833 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7833?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Di-8100 Firmware, Dlink Di-8100.