Successful exploits may allow attackers to run privileged commands on the affected device, change configuration, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible.
This issue affects D-Link DCS-900, DCS-2000, and DCS-5300.
Vendor Status:
D-Link as issued an update for this vulnerablity
Disclosure timeline:
Initial disclosure Feb 23 2012