We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01. Affected is the function wake_on_lan. The manipulation of the argument mac leads to command injection. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
Es wurde eine kritische Schwachstelle in D-Link DIR-605L 2.13B01 entdeckt. Es geht dabei um die Funktion wake_on_lan. Durch Manipulieren des Arguments mac mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren.
2025-05-08: | Advisory disclosed |
2025-05-08: | VulDB entry created |
2025-05-08: | VulDB entry last update |
jylsec (VulDB User)
vuldb.com/?id.308052 (VDB-308052 | D-Link DIR-605L wake_on_lan command injection)
vuldb.com/?ctiid.308052 (VDB-308052 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.558356 (Submit #558356 | D-Link DIR-605L 2.13B01 Command Injection)
github.com/...5l/Command_injection-wake_on_lan-mac/README.md
www.dlink.com/
Support options