漏洞描述 D-Link是台湾友讯集团所创立的网络公司,致力于局域网、宽带网、无线网、语音网及相关网络设备的研发、生产和行销。多款D-Link产品中存在操作系统命令注入漏洞。攻击者可利用该漏洞在受影响设备上下文中执行任意命令。
相关漏洞推荐 CVE-2019-16920: D-Link Unauthenticated remote code POC 2025-09-01 | D-Link Fofa app="D_Link-Router" CVE-2021-27250: D-LINK DAP-2020 webproc 任意文件读取漏洞 POC 2025-09-01 | D-LINK DAP-2020 近日D-Link发布公告[1]称旗下产品DAP-2020存在任意文件读取漏洞,CVE编号为CVE-2021-27250,目前已在硬件版本:A1,固件版本:1.01 上测试了PoC,由于漏洞影响核心组件... CVE-2023-5074: D-Link D-View 8 v2.0.1.28 - Authentication Bypass POC 2025-09-01 | D-Link D-View 8 Use of a static key to protect a JWT token used in user authentication can allow an for an authentic... CVE-2013-1965: Apache Struts2 S2-012 RCE POC 2025-09-01 | Apache Struts2 Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote ... CVE-2013-2251: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution (S2-016) POC 2025-09-01 | Apache Struts 2 In Struts 2 before 2.3.15.1 the information following "action:", "redirect:", or...