Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2019-13375
Disclosure Date: July 06, 2019 (last updated November 08, 2023)
A SQL Injection was discovered in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 in PayAction.class.php with the index.php/Pay/passcodeAuth parameter passcode. The vulnerability does not need any authentication.
0
Attacker Value
Unknown
CVE-2019-13374
Disclosure Date: July 06, 2019 (last updated November 08, 2023)
A cross-site scripting (XSS) vulnerability in resource view in PayAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to inject arbitrary web script or HTML via the index.php/Pay/passcodeAuth passcode parameter.
0
Attacker Value
Unknown
CVE-2019-13373
Disclosure Date: July 06, 2019 (last updated November 08, 2023)
An issue was discovered in the D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6. Input does not get validated and arbitrary SQL statements can be executed in the database via the /web/Public/Conn.php parameter dbSQL.
0
Attacker Value
Unknown
CVE-2018-15517
Disclosure Date: January 31, 2019 (last updated November 27, 2024)
The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI.
0
Attacker Value
Unknown
CVE-2018-15515
Disclosure Date: January 31, 2019 (last updated November 27, 2024)
The CaptivelPortal service on D-Link Central WiFiManager CWM-100 1.03 r0098 devices will load a Trojan horse "quserex.dll" from the CaptivelPortal.exe subdirectory under the D-Link directory, which allows unprivileged local users to gain SYSTEM privileges.
0
Attacker Value
Unknown
CVE-2018-15516
Disclosure Date: January 31, 2019 (last updated November 27, 2024)
The FTP service on D-Link Central WiFiManager CWM-100 1.03 r0098 devices allows remote attackers to conduct a PORT command bounce scan via port 8000, resulting in SSRF.
0