Description
A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.340129
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.340129
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.733275
Exploit, Third Party Advisory related
https://github.com/DavCloudz/cve/blob/main/D-link/DI_8200G/DI_8200G%20V17.12.20A1%20Command%20Execution%20Vulnerability/readme.md
Exploit, Third Party Advisory exploit
https://github.com/DavCloudz/cve/blob/main/D-link/DI_8200G/DI_8200G%20V17.12.20A1%20Command%20Execution%20Vulnerability/readme.md#poc
Product product
https://www.dlink.com/
Scores
CVSS v3
6.3
EPSS
0.0043
EPSS Percentile
63.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-74
CWE-77
Status
published
Products (1)
dlink/di-8200g_firmware
17.12.20a1
Published
Jan 09, 2026
Tracked Since
Feb 18, 2026