Show filters
923 Total Results
Displaying 361-370 of 923
Sort by:
Attacker Value
Unknown

CVE-2022-44201

Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR823G 1.02B05 is vulnerable to Commad Injection.
Attacker Value
Unknown

CVE-2022-44807

Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow via webGetVarString.
Attacker Value
Unknown

CVE-2022-44804

Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-882 1.10B02 and1.20B06 is vulnerable to Buffer Overflow via the websRedirect function.
Attacker Value
Unknown

CVE-2022-44806

Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow.
Attacker Value
Unknown

CVE-2022-44801

Disclosure Date: November 22, 2022 (last updated February 24, 2025)
D-Link DIR-878 1.02B05 is vulnerable to Incorrect Access Control.
Attacker Value
Unknown

CVE-2022-44808

Disclosure Date: November 22, 2022 (last updated February 24, 2025)
A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability.
Attacker Value
Unknown

CVE-2022-44204

Disclosure Date: November 18, 2022 (last updated February 24, 2025)
D-Link DIR3060 DIR3060A1_FW111B04.bin is vulnerable to Buffer Overflow.
Attacker Value
Unknown

CVE-2022-36786

Disclosure Date: November 17, 2022 (last updated February 24, 2025)
DLINK - DSL-224 Post-auth RCE. DLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API. It is possible to inject a command through this interface that will run with ROOT permissions on the router.
Attacker Value
Unknown

CVE-2022-36785

Disclosure Date: November 17, 2022 (last updated February 24, 2025)
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass. *Information Disclosure – file contains a URL with private IP at line 15 "login.asp" A. The window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ; "admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at *Authorization Bypass – URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.
Attacker Value
Unknown

CVE-2022-43109

Disclosure Date: November 03, 2022 (last updated February 24, 2025)
D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.