Show filters
923 Total Results
Displaying 331-340 of 923
Sort by:
Attacker Value
Unknown

CVE-2023-24345

Disclosure Date: February 10, 2023 (last updated February 24, 2025)
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetWanDhcpplus.
Attacker Value
Unknown

CVE-2023-24344

Disclosure Date: February 10, 2023 (last updated February 24, 2025)
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWlanGuestSetup.
Attacker Value
Unknown

CVE-2023-24343

Disclosure Date: February 10, 2023 (last updated February 24, 2025)
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSchedule.
Attacker Value
Unknown

CVE-2022-46552

Disclosure Date: February 02, 2023 (last updated February 24, 2025)
D-Link DIR-846 Firmware FW100A53DBR was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.
Attacker Value
Unknown

CVE-2022-47035

Disclosure Date: January 31, 2023 (last updated February 24, 2025)
Buffer Overflow Vulnerability in D-Link DIR-825 v1.33.0.44ebdd4-embedded and below allows attacker to execute arbitrary code via the GetConfig method to the /CPE endpoint.
Attacker Value
Unknown

CVE-2022-48108

Disclosure Date: January 27, 2023 (last updated February 24, 2025)
D-Link DIR_878_FW1.30B08 was discovered to contain a command injection vulnerability via the component /SetNetworkSettings/SubnetMask. This vulnerability allows attackers to escalate privileges to root via a crafted payload.
Attacker Value
Unknown

CVE-2022-48107

Disclosure Date: January 27, 2023 (last updated February 24, 2025)
D-Link DIR_878_FW1.30B08 was discovered to contain a command injection vulnerability via the component /setnetworksettings/IPAddress. This vulnerability allows attackers to escalate privileges to root via a crafted payload.
Attacker Value
Unknown

CVE-2022-41140

Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple D-Link routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the lighttpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13796.
Attacker Value
Unknown

CVE-2022-40720

Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the router. Was ZDI-CAN-15935.
Attacker Value
Unknown

CVE-2022-40719

Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd_generic.lua plugin for the xupnpd service, which listens on TCP port 4044 by default. When parsing the feed parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15906.