Description
diag_ping.cmd on D-Link DSL-2640U devices with firmware IM_1.00 and ME_1.00, and DSL-2540U devices with firmware ME_1.00, allows authenticated remote attackers to execute arbitrary OS commands via shell metacharacters in the ipaddr field of an HTTP GET request.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-17143 | diag_ping.cmd on D-Link DSL-2640U devices with firmware IM_1.00 and ME_1.00, and DSL-2540U devices with firmware ME_1.00, allows authenticated remote attackers to execute arbitrary OS commands via shell metacharacters in the ipaddr field of an HTTP GET request. |
References
| Link | Providers |
|---|---|
| https://www.iplantom.com/2018/01/10/dsl2640U/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:33:44.179Z
Reserved: 2018-01-12T00:00:00.000Z
Link: CVE-2018-5371
No data.
Status : Modified
Published: 2018-01-12T09:29:01.853
Modified: 2024-11-21T04:08:40.747
Link: CVE-2018-5371
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD