{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-48633","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-10-17T19:04:11.450Z","dateReserved":"2024-10-08T00:00:00.000Z","datePublished":"2024-10-17T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-10-17T17:19:07.098Z"},"descriptions":[{"lang":"en","value":"D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the ExternalPort, InternalPort, ProtocolNumber, and LocalIPAddress parameters in the SetVirtualServerSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.dlink.com/en/security-bulletin/"},{"url":"https://github.com/pjqwudi1/my_vuln/blob/main/D-link4/vuln_40/40.md"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}]}],"affected":[{"vendor":"dlink","product":"dir-882_firmware","cpes":["cpe:2.3:o:dlink:dir-882_firmware:1.30b06:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.30b06","status":"affected"}]},{"vendor":"dlink","product":"dir-878_firmware","cpes":["cpe:2.3:o:dlink:dir-878_firmware:1.30b08:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.30b08","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8,"attackVector":"ADJACENT_NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-10-17T18:52:37.471200Z","id":"CVE-2024-48633","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-17T19:04:11.450Z"}}]},"dataVersion":"5.1"}