Show filters
30 Total Results
Displaying 11-20 of 30
Sort by:
Attacker Value
Unknown

CVE-2022-44202

Disclosure Date: November 22, 2022 (last updated December 22, 2024)
D-Link DIR878 1.02B04 and 1.02B05 are vulnerable to Buffer Overflow.
Attacker Value
Unknown

CVE-2022-44801

Disclosure Date: November 22, 2022 (last updated December 22, 2024)
D-Link DIR-878 1.02B05 is vulnerable to Incorrect Access Control.
Attacker Value
Unknown

CVE-2022-43184

Disclosure Date: October 19, 2022 (last updated October 08, 2023)
D-Link DIR878 1.30B08 Hotfix_04 was discovered to contain a command injection vulnerability via the component /bin/proc.cgi.
Attacker Value
Unknown

CVE-2022-1262

Disclosure Date: April 11, 2022 (last updated February 23, 2025)
A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.
Attacker Value
Unknown

CVE-2022-26670

Disclosure Date: March 31, 2022 (last updated February 23, 2025)
D-Link DIR-878 has inadequate filtering for special characters in the webpage input field. An unauthenticated LAN attacker can perform command injection attack to execute arbitrary system commands to control the system or disrupt service.
Attacker Value
Unknown

CVE-2021-44882

Disclosure Date: February 04, 2022 (last updated February 23, 2025)
D-Link device DIR_878_FW1.30B08_Hotfix_02 was discovered to contain a command injection vulnerability in the twsystem function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.
Attacker Value
Unknown

CVE-2021-44880

Disclosure Date: February 04, 2022 (last updated February 23, 2025)
D-Link devices DIR_878 DIR_878_FW1.30B08_Hotfix_02 and DIR_882 DIR_882_FW1.30B06_Hotfix_02 were discovered to contain a command injection vulnerability in the system function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.
Attacker Value
Unknown

CVE-2021-30072

Disclosure Date: April 02, 2021 (last updated February 22, 2025)
An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication.
Attacker Value
Unknown

CVE-2020-15633

Disclosure Date: July 23, 2020 (last updated February 21, 2025)
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.
Attacker Value
Unknown

CVE-2020-8863

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-9470.