We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c
Reserved 2025-03-11 | Published 2025-04-17 | Updated 2025-05-01 | Assigner mitrewww.dlink.com/en/security-bulletin/
github.com/...ir-823x-diag_ping-target_addr-CommandInjection
gist.github.com/xyqer1/b3bebe4967a3093951273738f0be45ce
Support options