
blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability
Preview meta tags from the blog.exodusintel.com website.
Linked Hostnames
3Search Engine Appearance
D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence
EIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
Bing
D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence
EIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
DuckDuckGo

D-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence
EIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
General Meta Tags
8- titleD-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence
- charsetUTF-8
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- article:published_time2024-01-25T23:40:16+00:00
- article:modified_time2024-01-25T23:40:17+00:00
Open Graph Meta Tags
6og:locale
en_US- og:typearticle
- og:titleD-Link DAP-1650 SUBSCRIBE 'Callback' Command Injection Vulnerability - Exodus Intelligence
- og:descriptionEIP-5a0f4b12 The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root. Vulnerability Identifier Exodus Intelligence: EIP-5a0f4b12 MITRE: CVE-2024-23625 Vulnerability Metrics CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C CVSSv2 Score: 8.3 Vendor References The affected product is end-of-life ... Read more D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
- og:urlhttps://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability/
Twitter Meta Tags
5- twitter:cardsummary_large_image
- twitter:label1Written by
- twitter:data1Exodus Advisories
- twitter:label2Est. reading time
- twitter:data21 minute
Link Tags
35- EditURIhttps://blog.exodusintel.com/xmlrpc.php?rsd
- alternatehttps://blog.exodusintel.com/feed/
- alternatehttps://blog.exodusintel.com/comments/feed/
- alternatehttps://blog.exodusintel.com/wp-json/wp/v2/posts/2216
- alternatehttps://blog.exodusintel.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblog.exodusintel.com%2F2024%2F01%2F25%2Fd-link-dap-1650-subscribe-callback-command-injection-vulnerability%2F
Emails
1Links
21- https://blog.exodusintel.com
- https://blog.exodusintel.com/2024/01/25
- https://blog.exodusintel.com/advisories
- https://blog.exodusintel.com/category/advisories
- https://blog.exodusintel.com/category/exploit-techniques