We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in D-Link DIR-605L 2.13B01. It has been rated as critical. This issue affects the function sub_454F2C. The manipulation of the argument sysCmd leads to command injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
Eine Schwachstelle wurde in D-Link DIR-605L 2.13B01 ausgemacht. Sie wurde als kritisch eingestuft. Es geht hierbei um die Funktion sub_454F2C. Durch das Manipulieren des Arguments sysCmd mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden.
2025-05-08: | Advisory disclosed |
2025-05-08: | VulDB entry created |
2025-05-08: | VulDB entry last update |
jylsec (VulDB User)
vuldb.com/?id.308051 (VDB-308051 | D-Link DIR-605L sub_454F2C command injection)
vuldb.com/?ctiid.308051 (VDB-308051 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.558355 (Submit #558355 | D-Link DIR-605L 2.13B01 Command Injection)
github.com/.../Command_injection-sub_454F2C-sysCmd/README.md
www.dlink.com/
Support options