The restricted telnet shell on the D-Link DSL2730U router allows remote authenticated users to bypass intended command restrictions via shell metacharacters that follow a whitelisted command.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/876780 | US Government Resource |
http://www.kb.cert.org/vuls/id/876780 | US Government Resource |
Configurations
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/876780 - US Government Resource |
26 Apr 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:dlink:dsl-2730u:-:*:*:*:*:*:*:* | |
First Time |
Dlink
Dlink dsl-2730u |
Information
Published : 2012-12-13 11:53
Updated : 2025-04-11 00:51
NVD link : CVE-2012-5966
Mitre link : CVE-2012-5966
CVE.ORG link : CVE-2012-5966
JSON object : View
Products Affected
dlink
- dsl-2730u
CWE
CWE-264
Permissions, Privileges, and Access Controls