Show filters
68 Total Results
Displaying 51-60 of 68
Sort by:
Attacker Value
Unknown
CVE-2020-15893
Disclosure Date: July 22, 2020 (last updated February 21, 2025)
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
0
Attacker Value
Unknown
CVE-2020-15895
Disclosure Date: July 22, 2020 (last updated February 21, 2025)
An XSS issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. In the file webinc/js/info.php, no output filtration is applied to the RESULT parameter, before it's printed on the webpage.
0
Attacker Value
Unknown
CVE-2020-15894
Disclosure Date: July 22, 2020 (last updated February 21, 2025)
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. There exists an exposed administration function in getcfg.php, which can be used to call various services. It can be utilized by an attacker to retrieve various sensitive information, such as admin login credentials, by setting the value of _POST_SERVICES in the query string to DEVICE.ACCOUNT.
0
Attacker Value
Unknown
CVE-2019-17507
Disclosure Date: October 11, 2019 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A1 1.06 devices. An attacker could access management pages of the router via a client that ignores the 'top.location.href = "/dir_login.asp"' line in a .asp file. This provides access to d_status.asp, version.asp, d_dhcptbl.asp, and d_acl.asp.
0
Attacker Value
Unknown
CVE-2019-7642
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), DIR-816L (B1-2.06), DIR-816 (B1-2.06?), DIR-850L (A1-1.09), and DIR-868L (A1-1.10).
0
Attacker Value
Unknown
CVE-2019-10041
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.
0
Attacker Value
Unknown
CVE-2019-10040
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication.
0
Attacker Value
Unknown
CVE-2019-10042
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication.
0
Attacker Value
Unknown
CVE-2019-10039
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication.
0
Attacker Value
Unknown
CVE-2018-20305
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
D-Link DIR-816 A2 1.10 B05 devices allow arbitrary remote code execution without authentication via the newpass parameter. In the /goform/form2userconfig.cgi handler function, a long password may lead to a stack-based buffer overflow and overwrite a return address.
0