Show filters
68 Total Results
Displaying 51-60 of 68
Sort by:
Attacker Value
Unknown

CVE-2020-15893

Disclosure Date: July 22, 2020 (last updated February 21, 2025)
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
Attacker Value
Unknown

CVE-2020-15895

Disclosure Date: July 22, 2020 (last updated February 21, 2025)
An XSS issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. In the file webinc/js/info.php, no output filtration is applied to the RESULT parameter, before it's printed on the webpage.
Attacker Value
Unknown

CVE-2020-15894

Disclosure Date: July 22, 2020 (last updated February 21, 2025)
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. There exists an exposed administration function in getcfg.php, which can be used to call various services. It can be utilized by an attacker to retrieve various sensitive information, such as admin login credentials, by setting the value of _POST_SERVICES in the query string to DEVICE.ACCOUNT.
Attacker Value
Unknown

CVE-2019-17507

Disclosure Date: October 11, 2019 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A1 1.06 devices. An attacker could access management pages of the router via a client that ignores the 'top.location.href = "/dir_login.asp"' line in a .asp file. This provides access to d_status.asp, version.asp, d_dhcptbl.asp, and d_acl.asp.
Attacker Value
Unknown

CVE-2019-7642

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), DIR-816L (B1-2.06), DIR-816 (B1-2.06?), DIR-850L (A1-1.09), and DIR-868L (A1-1.10).
Attacker Value
Unknown

CVE-2019-10041

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.
0
Attacker Value
Unknown

CVE-2019-10040

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication.
0
Attacker Value
Unknown

CVE-2019-10042

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication.
0
Attacker Value
Unknown

CVE-2019-10039

Disclosure Date: March 25, 2019 (last updated November 27, 2024)
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication.
0
Attacker Value
Unknown

CVE-2018-20305

Disclosure Date: December 20, 2018 (last updated November 27, 2024)
D-Link DIR-816 A2 1.10 B05 devices allow arbitrary remote code execution without authentication via the newpass parameter. In the /goform/form2userconfig.cgi handler function, a long password may lead to a stack-based buffer overflow and overwrite a return address.
0