CVE-2023-4711
D-Link DAR-8000-10 decodmail.php os command injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability, which was classified as critical, has been found in D-Link DAR-8000-10 up to 20230819. Affected by this issue is some unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-238574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Una vulnerabilidad, clasificada como crítica, ha sido encontrada en D-Link DAR-8000-10 hasta 20230819.Una función desconocida del archivo /log/decodmail.php es afectada por este problema. La manipulación del argumento "file" conduce a la inyección de comandos de tipo "os". El ataque se puede iniciar de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotación es difícil. El exploit ha sido revelado al público y puede ser utilizado. VDB-238574 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó primeramente al proveedor sobre esta divulgación, pero no respondió de ninguna manera.
Eine kritische Schwachstelle wurde in D-Link DAR-8000-10 bis 20230819 entdeckt. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /log/decodmail.php. Mittels Manipulieren des Arguments file mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-09-01 CVE Reserved
- 2023-09-01 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2024-10-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.238574 | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/TinkAnet/cve/blob/main/rce.md | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Dlink Search vendor "Dlink" | Dar-8000-10 Firmware Search vendor "Dlink" for product "Dar-8000-10 Firmware" | <= 20230819 Search vendor "Dlink" for product "Dar-8000-10 Firmware" and version " <= 20230819" | - |
Affected
| in | Dlink Search vendor "Dlink" | Dar-8000-10 Search vendor "Dlink" for product "Dar-8000-10" | - | - |
Safe
|