Vulnerability Description
A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Di-8200G Firmware | 17.12.20a1 |
| Dlink | Di-8200G | - |
Related Weaknesses (CWE)
References
- https://github.com/DavCloudz/cve/blob/main/D-link/DI_8200G/DI_8200G%20V17.12.20AExploitThird Party Advisory
- https://github.com/DavCloudz/cve/blob/main/D-link/DI_8200G/DI_8200G%20V17.12.20AExploitThird Party Advisory
- https://vuldb.com/?ctiid.340129Permissions RequiredVDB Entry
- https://vuldb.com/?id.340129Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.733275Third Party AdvisoryVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2026-0732?
CVE-2026-0732 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attac...
How severe is CVE-2026-0732?
CVE-2026-0732 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0732?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Di-8200G Firmware, Dlink Di-8200G.