Show filters
52 Total Results
Displaying 31-40 of 52
Sort by:
Attacker Value
Unknown
CVE-2022-29321
Disclosure Date: May 10, 2022 (last updated October 07, 2023)
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the lanip parameter in /goform/setNetworkLan.
0
Attacker Value
Unknown
CVE-2022-28915
Disclosure Date: May 10, 2022 (last updated October 07, 2023)
D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a command injection vulnerability via the admuser and admpass parameters in /goform/setSysAdm.
0
Attacker Value
Unknown
CVE-2021-31326
Disclosure Date: March 24, 2022 (last updated October 07, 2023)
D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.
0
Attacker Value
Unknown
CVE-2021-39509
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.
0
Attacker Value
Unknown
CVE-2021-39510
Disclosure Date: August 24, 2021 (last updated February 23, 2025)
An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.
0
Attacker Value
Unknown
CVE-2021-27113
Disclosure Date: April 14, 2021 (last updated February 22, 2025)
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.
0
Attacker Value
Unknown
CVE-2021-27114
Disclosure Date: April 14, 2021 (last updated February 22, 2025)
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address.
0
Attacker Value
Unknown
CVE-2021-26810
Disclosure Date: March 30, 2021 (last updated February 22, 2025)
D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter.
0
Attacker Value
Unknown
CVE-2019-17507
Disclosure Date: October 11, 2019 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A1 1.06 devices. An attacker could access management pages of the router via a client that ignores the 'top.location.href = "/dir_login.asp"' line in a .asp file. This provides access to d_status.asp, version.asp, d_dhcptbl.asp, and d_acl.asp.
0
Attacker Value
Unknown
CVE-2019-7642
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), DIR-816L (B1-2.06), DIR-816 (B1-2.06?), DIR-850L (A1-1.09), and DIR-868L (A1-1.10).
0