Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-44809 | 1 Dlink | 2 Dir-820l, Dir-820l Firmware | 2024-09-17 | N/A | 9.8 CRITICAL |
D-Link device DIR-820L 1.05B03 is vulnerable to Insecure Permissions. | |||||
CVE-2022-26258 | 1 Dlink | 2 Dir-820l, Dir-820l Firmware | 2024-06-28 | 7.5 HIGH | 9.8 CRITICAL |
D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp. | |||||
CVE-2023-25279 | 1 Dlink | 2 Dir-820l, Dir-820l Firmware | 2024-02-04 | N/A | 9.8 CRITICAL |
OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload. | |||||
CVE-2023-25282 | 1 Dlink | 2 Dir-820l, Dir-820l Firmware | 2024-02-04 | N/A | 6.5 MEDIUM |
A heap overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the config.log_to_syslog and log_opt_dropPackets parameters to mydlink_api.ccp. | |||||
CVE-2023-25283 | 1 Dlink | 2 Dir-820l, Dir-820l Firmware | 2024-02-04 | N/A | 7.5 HIGH |
A stack overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the reserveDHCP_HostName_1.1.1.0 parameter to lan.asp. | |||||
CVE-2021-45382 | 1 Dlink | 12 Dir-810l, Dir-810l Firmware, Dir-820l and 9 more | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched. | |||||
CVE-2015-1187 | 3 D-link, Dlink, Trendnet | 30 Dir-626l Firmware, Dir-636l Firmware, Dir-651 Firmware and 27 more | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp. |