Check Point Reference: | CPAI-2022-0581 |
Date Published: | 12 Oct 2022 |
Severity: | Critical |
Last Updated: | Sunday 18 December, 2022 |
Source: | |
Industry Reference: | CVE-2018-17063 CVE-2018-17064 CVE-2018-17066 CVE-2018-17068 CVE-2022-28915 CVE-2022-28958 CVE-2022-37123 CVE-2022-37125 CVE-2022-37129 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | D-Link DIR816L FW206b01 D-Link DIR816L A2_v1.10CNB04 D-Link DIR-816 A2 1.10 B05 |
Vulnerability Description | A command injection vulnerability exists in D-Link DIR816L. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: D-Link DIR816L Command Injection