blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability

Preview meta tags from the blog.exodusintel.com website.

Linked Hostnames

3

Search Engine Appearance

Google

https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability

D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence

EIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability



Bing

D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence

https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability

EIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability



DuckDuckGo

https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability

D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence

EIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability

  • General Meta Tags

    8
    • title
      D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence
    • charset
      UTF-8
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
    • article:published_time
      2024-01-25T23:40:16+00:00
    • article:modified_time
      2024-01-25T23:40:17+00:00
  • Open Graph Meta Tags

    6
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence
    • og:description
      EIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
    • og:url
      https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability/
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:label1
      Written by
    • twitter:data1
      Exodus Advisories
    • twitter:label2
      Est. reading time
    • twitter:data2
      1 minute
  • Link Tags

    35
    • EditURI
      https://blog.exodusintel.com/xmlrpc.php?rsd
    • alternate
      https://blog.exodusintel.com/feed/
    • alternate
      https://blog.exodusintel.com/comments/feed/
    • alternate
      https://blog.exodusintel.com/wp-json/wp/v2/posts/2216
    • alternate
      https://blog.exodusintel.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblog.exodusintel.com%2F2024%2F01%2F25%2Fd-link-dap-1650-subscribe-callback-command-injection-vulnerability%2F

Emails

1

Links

21