We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41710c
Reserved 2025-03-11 | Published 2025-04-17 | Updated 2025-05-01 | Assigner mitrewww.dlink.com/en/security-bulletin/
github.com/...23x-diag_nslookup-target_addr-CommandInjection
gist.github.com/xyqer1/101b7308bdf8618d8be30bd1d09ddd38
Support options