Show filters
923 Total Results
Displaying 361-370 of 923
Sort by:
Attacker Value
Unknown
CVE-2022-44201
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR823G 1.02B05 is vulnerable to Commad Injection.
0
Attacker Value
Unknown
CVE-2022-44807
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow via webGetVarString.
0
Attacker Value
Unknown
CVE-2022-44804
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-882 1.10B02 and1.20B06 is vulnerable to Buffer Overflow via the websRedirect function.
0
Attacker Value
Unknown
CVE-2022-44806
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow.
0
Attacker Value
Unknown
CVE-2022-44801
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-878 1.02B05 is vulnerable to Incorrect Access Control.
0
Attacker Value
Unknown
CVE-2022-44808
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability.
0
Attacker Value
Unknown
CVE-2022-44204
Disclosure Date: November 18, 2022 (last updated February 24, 2025)
D-Link DIR3060 DIR3060A1_FW111B04.bin is vulnerable to Buffer Overflow.
0
Attacker Value
Unknown
CVE-2022-36786
Disclosure Date: November 17, 2022 (last updated February 24, 2025)
DLINK - DSL-224 Post-auth RCE.
DLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API.
It is possible to inject a command through this interface that will run with ROOT permissions on the router.
0
Attacker Value
Unknown
CVE-2022-36785
Disclosure Date: November 17, 2022 (last updated February 24, 2025)
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass.
*Information Disclosure –
file contains a URL with private IP at line 15 "login.asp" A. The
window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ;
"admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at
*Authorization Bypass –
URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.
0
Attacker Value
Unknown
CVE-2022-43109
Disclosure Date: November 03, 2022 (last updated February 24, 2025)
D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.
0