A flaw has been found in D-Link DI-7100G C1 24.04.18D1. This affects the function start_proxy_client_email. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/glkfc/IoT-Vulnerability/blob/main/D-Link/Dlink_3.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.344897 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344897 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.749804 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-09 00:15
Updated : 2026-02-11 18:36
NVD link : CVE-2026-2194
Mitre link : CVE-2026-2194
CVE.ORG link : CVE-2026-2194
JSON object : View
Products Affected
dlink
- di-7100g_c1
- di-7100g_c1_firmware
