Show filters
18 Total Results
Displaying 11-18 of 18
Sort by:
Attacker Value
Unknown

CVE-2018-15839

Disclosure Date: August 28, 2018 (last updated November 27, 2024)
D-Link DIR-615 devices have a buffer overflow via a long Authorization HTTP header.
Attacker Value
Unknown

CVE-2018-15874

Disclosure Date: August 25, 2018 (last updated November 27, 2024)
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows an attacker to inject JavaScript into the "Status -> Active Client Table" page via the hostname field in a DHCP request.
Attacker Value
Unknown

CVE-2018-15875

Disclosure Date: August 25, 2018 (last updated November 27, 2024)
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows attackers to inject JavaScript into the router's admin UPnP page via the description field in an AddPortMapping UPnP SOAP request.
Attacker Value
Unknown

CVE-2018-10431

Disclosure Date: April 26, 2018 (last updated November 26, 2024)
D-Link DIR-615 2.5.17 devices allow Remote Code Execution via shell metacharacters in the Host field of the System / Traceroute screen.
0
Attacker Value
Unknown

CVE-2018-10110

Disclosure Date: April 18, 2018 (last updated November 26, 2024)
D-Link DIR-615 T1 devices allow XSS via the Add User feature.
0
Attacker Value
Unknown

CVE-2017-9542

Disclosure Date: June 11, 2017 (last updated November 26, 2024)
D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device.
0
Attacker Value
Unknown

CVE-2017-7398

Disclosure Date: April 04, 2017 (last updated November 26, 2024)
D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated, as demonstrated by changing the Security option from WPA2 to None, or changing the hiddenSSID parameter, SSID parameter, or a security-option password.
0
Attacker Value
Unknown

CVE-2014-8361

Disclosure Date: May 01, 2015 (last updated June 28, 2024)
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.