Filtered by vendor D-link
Subscribe
Total
279 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-8888 | 1 D-link | 2 Dir-815, Dir-815 Firmware | 2018-05-18 | 10.0 HIGH | 9.8 CRITICAL |
The remote administration interface in D-Link DIR-815 devices with firmware before 2.03.B02 allows remote attackers to execute arbitrary commands via vectors related to an "HTTP command injection issue." | |||||
CVE-2015-0152 | 1 D-link | 2 Dir-815, Dir-815 Firmware | 2018-05-18 | 5.0 MEDIUM | 9.8 CRITICAL |
D-Link DIR-815 devices with firmware before 2.07.B01 allow remote attackers to obtain sensitive information by leveraging cleartext storage of the administrative password. | |||||
CVE-2015-0151 | 1 D-link | 2 Dir-815, Dir-815 Firmware | 2018-05-16 | 6.8 MEDIUM | 8.8 HIGH |
Cross-site request forgery (CSRF) vulnerability in D-Link DIR-815 devices with firmware before 2.07.B01 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. | |||||
CVE-2018-6527 | 1 D-link | 6 Dir-860l, Dir-860l Firmware, Dir-865l and 3 more | 2018-03-27 | 4.3 MEDIUM | 6.1 MEDIUM |
XSS vulnerability in htdocs/webinc/js/adv_parent_ctrl_map.php in D-Link DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to read a cookie via a crafted deviceid parameter to soap.cgi. | |||||
CVE-2018-6529 | 1 D-link | 6 Dir-860l, Dir-860l Firmware, Dir-865l and 3 more | 2018-03-27 | 4.3 MEDIUM | 6.1 MEDIUM |
XSS vulnerability in htdocs/webinc/js/bsc_sms_inbox.php in D-Link DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to read a cookie via a crafted Treturn parameter to soap.cgi. | |||||
CVE-2018-6528 | 1 D-link | 6 Dir-860l, Dir-860l Firmware, Dir-865l and 3 more | 2018-03-27 | 4.3 MEDIUM | 6.1 MEDIUM |
XSS vulnerability in htdocs/webinc/body/bsc_sms_send.php in D-Link DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to read a cookie via a crafted receiver parameter to soap.cgi. | |||||
CVE-2018-6530 | 1 D-link | 8 Dir-860l, Dir-860l Firmware, Dir-865l and 5 more | 2018-03-27 | 10.0 HIGH | 9.8 CRITICAL |
OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter. | |||||
CVE-2018-6936 | 1 D-link | 2 Dir-600m C1, Dir-600m C1 Firmware | 2018-03-13 | 3.5 LOW | 5.4 MEDIUM |
Cross Site Scripting (XSS) exists on the D-Link DIR-600M C1 3.01 via the SSID or the name of a user account. | |||||
CVE-2018-5371 | 1 D-link | 4 Dsl-2540u, Dsl-2540u Firmware, Dsl-2640u and 1 more | 2018-02-02 | 9.0 HIGH | 8.8 HIGH |
diag_ping.cmd on D-Link DSL-2640U devices with firmware IM_1.00 and ME_1.00, and DSL-2540U devices with firmware ME_1.00, allows authenticated remote attackers to execute arbitrary OS commands via shell metacharacters in the ipaddr field of an HTTP GET request. | |||||
CVE-2017-17065 | 1 D-link | 2 Dir-605l Model B, Dir-605l Model B Firmware | 2017-12-20 | 7.8 HIGH | 7.5 HIGH |
An issue was discovered on D-Link DIR-605L Model B before FW2.11betaB06_hbrf devices, related to the code that handles the authentication values for HNAP. An attacker can cause a denial of service (device crash) or possibly have unspecified other impact by sending a sufficiently long string in the password field of the HTTP Basic Authentication section of the HTTP request. | |||||
CVE-2001-1137 | 1 D-link | 1 Dl-704 | 2017-12-18 | 5.0 MEDIUM | N/A |
D-Link DI-704 Internet Gateway firmware earlier than V2.56b6 allows remote attackers to cause a denial of service (reboot) via malformed IP datagram fragments. | |||||
CVE-2017-7851 | 1 D-link | 1 Dcs-936l | 2017-12-03 | 6.8 MEDIUM | 8.8 HIGH |
D-Link DCS-936L devices with firmware before 1.05.07 have an inadequate CSRF protection mechanism that requires the device's IP address to be a substring of the HTTP Referer header. | |||||
CVE-2016-10699 | 1 D-link | 2 Dsl-2740e, Dsl-2740e Firmware | 2017-11-18 | 4.3 MEDIUM | 6.1 MEDIUM |
D-Link DSL-2740E 1.00_BG_20150720 devices are prone to persistent XSS attacks in the username and password fields: a remote unauthenticated user may craft logins and passwords with script tags in them. Because there is no sanitization in the input fields, an unaware logged-in administrator may be a victim when checking the router logs. | |||||
CVE-2017-15909 | 1 D-link | 2 Dgs-1500, Dgs-1500 Firmware | 2017-11-15 | 7.5 HIGH | 9.8 CRITICAL |
D-Link DGS-1500 Ax devices before 2.51B021 have a hardcoded password, which allows remote attackers to obtain shell access. | |||||
CVE-2015-1187 | 2 D-link, Trendnet | 30 Dir-626l, Dir-626l Firmware, Dir-636l and 27 more | 2017-10-05 | 10.0 HIGH | 9.8 CRITICAL |
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp. | |||||
CVE-2008-4771 | 3 4xem, D-link, Vivotek | 3 Vatctrl Class, Mpeg4 Shm Audio Control, Rtsp Mpeg4 Sp Control | 2017-09-28 | 9.3 HIGH | N/A |
Stack-based buffer overflow in VATDecoder.VatCtrl.1 ActiveX control in (1) 4xem VatCtrl Class (VATDecoder.dll 1.0.0.27 and 1.0.0.51), (2) D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5), (3) Vivotek RTSP MPEG4 SP Control (RtspVapgDecoderNew.dll 2.0.0.39), and possibly other products, allows remote attackers to execute arbitrary code via a long Url property. NOTE: some of these details are obtained from third party information. | |||||
CVE-2017-14422 | 1 D-link | 2 Dir-850l, Dir-850l Firmware | 2017-09-20 | 5.0 MEDIUM | 7.5 HIGH |
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation. | |||||
CVE-2017-14421 | 1 D-link | 2 Dir-850l, Dir-850l Firmware | 2017-09-20 | 10.0 HIGH | 9.8 CRITICAL |
D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session. | |||||
CVE-2017-14419 | 1 D-link | 2 Dir-850l, Dir-850l Firmware | 2017-09-20 | 4.3 MEDIUM | 5.9 MEDIUM |
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established. | |||||
CVE-2017-14420 | 1 D-link | 2 Dir-850l, Dir-850l Firmware | 2017-09-20 | 4.3 MEDIUM | 5.9 MEDIUM |
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. |