Filtered by vendor Dlink
Subscribe
Total
1359 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-4855 | 1 Dlink | 2 Dir-865l, Dir-865l Firmware | 2023-04-26 | 7.9 HIGH | 8.8 HIGH |
D-Link DIR-865L has SMB Symlink Traversal due to misconfiguration in the SMB service allowing symbolic links to be created to locations outside of the Samba share. | |||||
CVE-2019-19226 | 1 Dlink | 2 Dsl-2680, Dsl-2680 Firmware | 2023-04-26 | 5.0 MEDIUM | 7.5 HIGH |
A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to enable or disable MAC address filtering by submitting a crafted Forms/WlanMacFilter_1 POST request without being authenticated on the admin interface. | |||||
CVE-2018-10957 | 1 Dlink | 2 Dir-868l, Dir-868l Firmware | 2023-04-26 | 6.8 MEDIUM | 8.8 HIGH |
CSRF exists on D-Link DIR-868L devices, leading to (for example) a change to the Admin password. hedwig.cgi and pigwidgeon.cgi are two of the affected components. | |||||
CVE-2015-0150 | 1 Dlink | 2 Dir-815, Dir-815 Firmware | 2023-04-26 | 7.5 HIGH | 9.8 CRITICAL |
The remote administration UI in D-Link DIR-815 devices with firmware before 2.07.B01 allows remote attackers to bypass intended access restrictions via unspecified vectors. | |||||
CVE-2020-13135 | 1 Dlink | 2 Dsp-w215, Dsp-w215 Firmware | 2023-04-26 | 3.3 LOW | 6.5 MEDIUM |
D-Link DSP-W215 1.26b03 devices allow information disclosure by intercepting messages on the local network, as demonstrated by a Squid Proxy. | |||||
CVE-2014-8888 | 1 Dlink | 2 Dir-815, Dir-815 Firmware | 2023-04-26 | 10.0 HIGH | 9.8 CRITICAL |
The remote administration interface in D-Link DIR-815 devices with firmware before 2.03.B02 allows remote attackers to execute arbitrary commands via vectors related to an "HTTP command injection issue." | |||||
CVE-2017-17020 | 1 Dlink | 6 Dcs-5009, Dcs-5009 Firmware, Dcs-5010 and 3 more | 2023-04-26 | 6.5 MEDIUM | 8.8 HIGH |
On D-Link DCS-5009 devices with firmware 1.08.11 and earlier, DCS-5010 devices with firmware 1.14.09 and earlier, and DCS-5020L devices with firmware before 1.15.01, command injection in alphapd (binary responsible for running the camera's web server) allows remote authenticated attackers to execute code through sanitized /setSystemAdmin user input in the AdminID field being passed directly to a call to system. | |||||
CVE-2020-9535 | 1 Dlink | 2 Dir-615jx10, Dir-615jx10 Firmware | 2023-04-26 | 6.5 MEDIUM | 8.8 HIGH |
fmwlan.c on D-Link DIR-615Jx10 devices has a stack-based buffer overflow via the formWlanSetup_Wizard webpage parameter when f_radius_ip1 is malformed. | |||||
CVE-2013-7052 | 1 Dlink | 2 Dir-100, Dir-100 Firmware | 2023-04-26 | 5.0 MEDIUM | 9.8 CRITICAL |
D-Link DIR-100 4.03B07: security bypass via an error in the cliget.cgi script | |||||
CVE-2021-34860 | 1 Dlink | 2 Dap-2020, Dap-2020 Firmware | 2023-04-26 | 3.3 LOW | 6.5 MEDIUM |
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the getpage parameter provided to the webproc endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-12103. | |||||
CVE-2011-4821 | 1 Dlink | 2 Dir-601, Dir-601 Firmware | 2023-04-26 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors. | |||||
CVE-2020-6841 | 1 Dlink | 2 Dch-m225, Dch-m225 Firmware | 2023-04-26 | 10.0 HIGH | 9.8 CRITICAL |
D-Link DCH-M225 1.05b01 and earlier devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the spotifyConnect.php userName parameter. | |||||
CVE-2013-4857 | 1 Dlink | 2 Dir-865l, Dir-865l Firmware | 2023-04-26 | 7.5 HIGH | 9.8 CRITICAL |
D-Link DIR-865L has PHP File Inclusion in the router xml file. | |||||
CVE-2020-24580 | 1 Dlink | 2 Dsl2888a, Dsl2888a Firmware | 2023-04-26 | 5.4 MEDIUM | 7.5 HIGH |
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. Lack of authentication functionality allows an attacker to assign a static IP address that was once used by a valid user. | |||||
CVE-2012-6614 | 1 Dlink | 2 Dsr-250n, Dsr-250n Firmware | 2023-04-26 | 9.0 HIGH | 7.2 HIGH |
D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain "persistent root access" via the BusyBox CLI, as demonstrated by overwriting the super user password. | |||||
CVE-2021-21816 | 1 Dlink | 2 Dir-3040, Dir-3040 Firmware | 2023-04-26 | 4.3 MEDIUM | 4.3 MEDIUM |
An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability. | |||||
CVE-2016-10125 | 1 Dlink | 13 Dgs-1100-05, Dgs-1100-05pd, Dgs-1100-08 and 10 more | 2023-04-26 | 6.8 MEDIUM | 8.1 HIGH |
D-Link DGS-1100 devices with Rev.B firmware 1.01.018 have a hardcoded SSL private key, which allows man-in-the-middle attackers to spoof devices by hijacking an HTTPS session. | |||||
CVE-2018-8898 | 1 Dlink | 2 Dsl-3782, Dsl-3782 Firmware | 2023-04-26 | 7.5 HIGH | 9.8 CRITICAL |
A flaw in the authentication mechanism in the Login Panel of router D-Link DSL-3782 (A1_WI_20170303 || SWVer="V100R001B012" FWVer="3.10.0.24" FirmVer="TT_77616E6771696F6E67") allows unauthenticated attackers to perform arbitrary modification (read, write) to passwords and configurations meanwhile an administrator is logged into the web panel. | |||||
CVE-2015-2050 | 1 Dlink | 2 Dap-1320, Dap-1320 Firmware | 2023-04-26 | 10.0 HIGH | N/A |
D-Link DAP-1320 Rev Ax with firmware before 1.21b05 allows attackers to execute arbitrary commands via unspecified vectors. | |||||
CVE-2018-17064 | 1 Dlink | 2 Dir-816 A2, Dir-816 A2 Firmware | 2023-04-26 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/sylogapply route. This could lead to command injection via the syslogIp parameter after /goform/clearlog is invoked. |