Show filters
29 Total Results
Displaying 11-20 of 29
Sort by:
Attacker Value
Unknown
CVE-2022-44801
Disclosure Date: November 22, 2022 (last updated December 22, 2024)
D-Link DIR-878 1.02B05 is vulnerable to Incorrect Access Control.
0
Attacker Value
Unknown
CVE-2022-43184
Disclosure Date: October 19, 2022 (last updated October 08, 2023)
D-Link DIR878 1.30B08 Hotfix_04 was discovered to contain a command injection vulnerability via the component /bin/proc.cgi.
0
Attacker Value
Unknown
CVE-2022-1262
Disclosure Date: April 11, 2022 (last updated October 07, 2023)
A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.
0
Attacker Value
Unknown
CVE-2022-26670
Disclosure Date: March 31, 2022 (last updated October 07, 2023)
D-Link DIR-878 has inadequate filtering for special characters in the webpage input field. An unauthenticated LAN attacker can perform command injection attack to execute arbitrary system commands to control the system or disrupt service.
0
Attacker Value
Unknown
CVE-2021-44882
Disclosure Date: February 04, 2022 (last updated October 07, 2023)
D-Link device DIR_878_FW1.30B08_Hotfix_02 was discovered to contain a command injection vulnerability in the twsystem function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.
0
Attacker Value
Unknown
CVE-2021-44880
Disclosure Date: February 04, 2022 (last updated October 07, 2023)
D-Link devices DIR_878 DIR_878_FW1.30B08_Hotfix_02 and DIR_882 DIR_882_FW1.30B06_Hotfix_02 were discovered to contain a command injection vulnerability in the system function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.
0
Attacker Value
Unknown
CVE-2021-30072
Disclosure Date: April 02, 2021 (last updated February 22, 2025)
An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication.
0
Attacker Value
Unknown
CVE-2020-15633
Disclosure Date: July 23, 2020 (last updated February 21, 2025)
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.
0
Attacker Value
Unknown
CVE-2020-8863
Disclosure Date: March 23, 2020 (last updated February 21, 2025)
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-9470.
0
Attacker Value
Unknown
CVE-2019-9124
Disclosure Date: February 25, 2019 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-878 1.12B01 devices. At the /HNAP1 URI, an attacker can log in with a blank password.
0