Show filters
923 Total Results
Displaying 331-340 of 923
Sort by:
Attacker Value
Unknown
CVE-2023-24345
Disclosure Date: February 10, 2023 (last updated February 24, 2025)
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetWanDhcpplus.
0
Attacker Value
Unknown
CVE-2023-24344
Disclosure Date: February 10, 2023 (last updated February 24, 2025)
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWlanGuestSetup.
0
Attacker Value
Unknown
CVE-2023-24343
Disclosure Date: February 10, 2023 (last updated February 24, 2025)
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSchedule.
0
Attacker Value
Unknown
CVE-2022-46552
Disclosure Date: February 02, 2023 (last updated February 24, 2025)
D-Link DIR-846 Firmware FW100A53DBR was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.
0
Attacker Value
Unknown
CVE-2022-47035
Disclosure Date: January 31, 2023 (last updated February 24, 2025)
Buffer Overflow Vulnerability in D-Link DIR-825 v1.33.0.44ebdd4-embedded and below allows attacker to execute arbitrary code via the GetConfig method to the /CPE endpoint.
0
Attacker Value
Unknown
CVE-2022-48108
Disclosure Date: January 27, 2023 (last updated February 24, 2025)
D-Link DIR_878_FW1.30B08 was discovered to contain a command injection vulnerability via the component /SetNetworkSettings/SubnetMask. This vulnerability allows attackers to escalate privileges to root via a crafted payload.
0
Attacker Value
Unknown
CVE-2022-48107
Disclosure Date: January 27, 2023 (last updated February 24, 2025)
D-Link DIR_878_FW1.30B08 was discovered to contain a command injection vulnerability via the component /setnetworksettings/IPAddress. This vulnerability allows attackers to escalate privileges to root via a crafted payload.
0
Attacker Value
Unknown
CVE-2022-41140
Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple D-Link routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the lighttpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13796.
0
Attacker Value
Unknown
CVE-2022-40720
Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the router. Was ZDI-CAN-15935.
0
Attacker Value
Unknown
CVE-2022-40719
Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd_generic.lua plugin for the xupnpd service, which listens on TCP port 4044 by default. When parsing the feed parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15906.
0