Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown

CVE-2024-0717

Disclosure Date: January 19, 2024 (last updated January 26, 2024)
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2021-42627

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
Attacker Value
Unknown

CVE-2021-40654

Disclosure Date: September 24, 2021 (last updated November 28, 2024)
An information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page
Attacker Value
Unknown

CVE-2021-37388

Disclosure Date: August 06, 2021 (last updated November 28, 2024)
A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.
Attacker Value
Unknown

CVE-2019-17525

Disclosure Date: April 21, 2020 (last updated February 21, 2025)
The login page on D-Link DIR-615 T1 20.10 devices allows remote attackers to bypass the CAPTCHA protection mechanism and conduct brute-force attacks.
Attacker Value
Unknown

CVE-2019-19742

Disclosure Date: December 18, 2019 (last updated November 08, 2023)
On D-Link DIR-615 devices, the User Account Configuration page is vulnerable to blind XSS via the name field.
Attacker Value
Unknown

CVE-2019-19743

Disclosure Date: December 16, 2019 (last updated November 27, 2024)
On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal.
Attacker Value
Unknown

CVE-2019-18852

Disclosure Date: November 11, 2019 (last updated November 27, 2024)
Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00.
Attacker Value
Unknown

CVE-2019-17353

Disclosure Date: October 09, 2019 (last updated November 27, 2024)
An issue discovered on D-Link DIR-615 devices with firmware version 20.05 and 20.07. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
Attacker Value
Unknown

CVE-2019-16920

Disclosure Date: September 27, 2019 (last updated July 17, 2024)
Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.