D-Link D-View execMonitorScript RCE via Auth Bypass
CVE-2024-5299 Published on May 23, 2024
D-Link D-View execMonitorScript Exposed Dangerous Method Remote Code Execution Vulnerability
D-Link D-View execMonitorScript Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the execMonitorScript method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21828.
Weakness Type
Exposed Dangerous Method or Function
The software provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.
Products Associated with CVE-2024-5299
Want to know whenever a new CVE is published for D-Link D View 8? stack.watch will email you.
Affected Versions
D-Link D-View:- Version 2.0.1.28 is affected.
- Before 2.0.3.88 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.