Impact
The vulnerability involves the function set_jhttpd_info in the firmware of the D-Link DI-7100G C1. Manipulation of the usb_username parameter allows arbitrary command injection, enabling an attacker to execute commands on the device without authentication. This flaw falls under CWE‑74 (Improper Validation of Input) and CWE‑77 (Command Injection). The potential impact is complete control over the device, enabling further compromise of the network.
Affected Systems
Affected product: D-Link DI-7100G C1 running firmware version 24.04.18D1. The vulnerability is present only in this specific firmware build and may be mitigated by updating to a newer, patched version.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate severity, and the EPSS score is below 1%, suggesting low current exploitation probability. However, the vulnerability is exposed via a web-based interface and remote exploitation is possible, meaning an attacker with network visibility could potentially abuse it. The flaw is not listed in the CISA KEV catalog, but its remote nature warrants immediate attention.
OpenCVE Enrichment