Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2018-17068

Disclosure Date: September 15, 2018 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/Diagnosis route. This could lead to command injection via shell metacharacters in the sendNum parameter.
0
Attacker Value
Unknown

CVE-2018-17065

Disclosure Date: September 15, 2018 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/DDNS route, a very long password could lead to a stack-based buffer overflow and overwrite the return address.
0
Attacker Value
Unknown

CVE-2018-17067

Disclosure Date: September 15, 2018 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. A very long password to /goform/formLogin could lead to a stack-based buffer overflow and overwrite the return address.
0
Attacker Value
Unknown

CVE-2018-17066

Disclosure Date: September 15, 2018 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/form2systime.cgi route. This could lead to command injection via shell metacharacters in the datetime parameter.
0
Attacker Value
Unknown

CVE-2018-17064

Disclosure Date: September 15, 2018 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/sylogapply route. This could lead to command injection via the syslogIp parameter after /goform/clearlog is invoked.
0
Attacker Value
Unknown

CVE-2018-17063

Disclosure Date: September 15, 2018 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/NTPSyncWithHost route. This could lead to command injection via shell metacharacters.
0