Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2022-44808
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability.
0
Attacker Value
Unknown
CVE-2019-13128
Disclosure Date: July 01, 2019 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the IPAddress or Gateway field to SetStaticRouteSettings.
0
Attacker Value
Unknown
CVE-2019-8392
Disclosure Date: February 17, 2019 (last updated November 27, 2024)
An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to enable Guest Wi-Fi via the SetWLanRadioSettings HNAP API to the web service provided by /bin/goahead.
0
Attacker Value
Unknown
CVE-2019-7389
Disclosure Date: February 05, 2019 (last updated November 27, 2024)
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with the firmware 1.02B03. There is incorrect access control allowing remote attackers to reset the router without authentication via the SetFactoryDefault HNAP API. Consequently, an attacker can achieve a denial-of-service attack without authentication.
0
Attacker Value
Unknown
CVE-2019-7390
Disclosure Date: February 05, 2019 (last updated November 27, 2024)
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API.
0
Attacker Value
Unknown
CVE-2019-7388
Disclosure Date: February 05, 2019 (last updated November 27, 2024)
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to get sensitive information (such as MAC address) about all clients in the WLAN via the GetClientInfo HNAP API. Consequently, an attacker can achieve information disclosure without authentication.
0