CVE-2026-0732
Unknown Unknown - Not Provided
Remote Command Injection in D-Link DI-8200G /upgrade_filter.asp

Publication date: 2026-01-09

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-01-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
d-link di-8200g 17.12.20a1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a command injection flaw in the D-Link DI-8200G router firmware version 17.12.20A1, specifically in the /upgrade_filter.asp file. It occurs due to improper handling of the 'path' argument, allowing an attacker to remotely inject and execute arbitrary commands on the device by sending specially crafted HTTP POST requests. This can be exploited easily and remotely without user interaction. [1, 3]


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to unauthorized command execution on the affected router, impacting the confidentiality, integrity, and availability of the device. An attacker could take control of the router, potentially disrupting network operations, intercepting or altering data, or using the device as a foothold for further attacks. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for HTTP POST requests targeting the path `/upgrade_filter.asp` on the D-Link DI-8200G router version 17.12.20A1. Additionally, attackers may be identified using Google dorking with queries such as `inurl:upgrade_filter.asp`. Network administrators can use tools like curl or wget to test if the endpoint is accessible and vulnerable by sending crafted POST requests to `/upgrade_filter.asp`. For example, a command to check connectivity could be: `curl -X POST http://<router-ip>/upgrade_filter.asp -d 'path=test'`. Monitoring logs for unusual POST requests to this path or unexpected command execution behavior on the device can also help detect exploitation attempts. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

No known countermeasures or mitigations have been reported for this vulnerability. The suggested immediate step is to replace the affected D-Link DI-8200G router version 17.12.20A1 with an alternative device that is not vulnerable. Until replacement, restricting remote access to the device and monitoring for suspicious activity targeting `/upgrade_filter.asp` may help reduce risk. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart