A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
References
| Link | Resource |
|---|---|
| https://github.com/DavCloudz/cve/blob/main/D-link/DI_8200G/DI_8200G%20V17.12.20A1%20Command%20Execution%20Vulnerability/readme.md | Exploit Third Party Advisory |
| https://github.com/DavCloudz/cve/blob/main/D-link/DI_8200G/DI_8200G%20V17.12.20A1%20Command%20Execution%20Vulnerability/readme.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.340129 | Permissions Required VDB Entry |
| https://vuldb.com/?id.340129 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.733275 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-09 00:15
Updated : 2026-01-14 18:57
NVD link : CVE-2026-0732
Mitre link : CVE-2026-0732
CVE.ORG link : CVE-2026-0732
JSON object : View
Products Affected
dlink
- di-8200g
- di-8200g_firmware
