Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
d-link dir-822 firmware vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-19989
In the /HNAP1/SetQoSSettings message, the uplink parameter is vulnerable, and the vulnerability affects D-Link DIR-822 Rev.B 202KRb06 and DIR-822 Rev.C 3.10B06 devices. In the SetQoSSettings.php source code, the uplink parameter is saved in the /bwc/entry:1/bandwidth and /bwc/ent...
D-link Dir-822 Firmware 202krb06
Dlink Dir-822 Firmware 3.10b06
9.8
CVSSv3
CVE-2019-6258
D-Link DIR-822 Rev.Bx devices with firmware v.202KRb06 and older allow a buffer overflow via long MacAddress data in a /HNAP1/SetClientInfo HNAP protocol message, which is mishandled in /usr/sbin/udhcpd during reading of the /var/servd/LAN-1-udhcpd.conf file.
D-link Dir-822 Firmware
9.8
CVSSv3
CVE-2018-19990
In the /HNAP1/SetWiFiVerifyAlpha message, the WPSPIN parameter is vulnerable, and the vulnerability affects D-Link DIR-822 B1 202KRb06 devices. In the SetWiFiVerifyAlpha.php source code, the WPSPIN parameter is saved in the $rphyinf1."/media/wps/enrollee/pin" and $rphyi...
D-link Dir-822 Firmware 202krb06
9.8
CVSSv3
CVE-2018-19986
In the /HNAP1/SetRouterSettings message, the RemotePort parameter is vulnerable, and the vulnerability affects D-Link DIR-818LW Rev.A 2.05.B03 and DIR-822 B1 202KRb06 devices. In the SetRouterSettings.php source code, the RemotePort parameter is saved in the $path_inf_wan1."...
D-link Dir-818lw Firmware 2.05.b03
D-link Dir-822 Firmware 202krb06
1 Github repository
9.8
CVSSv3
CVE-2018-19987
D-Link DIR-822 Rev.B 202KRb06, DIR-822 Rev.C 3.10B06, DIR-860L Rev.B 2.03.B03, DIR-868L Rev.B 2.05B02, DIR-880L Rev.A 1.20B01_01_i3se_BETA, and DIR-890L Rev.A 1.21B02_BETA devices mishandle IsAccessPoint in /HNAP1/SetAccessPointMode. In the SetAccessPointMode.php source code, the...
D-link Dir-818lw Firmware 2.05.b03
D-link Dir-822 Firmware 202krb06
Dlink Dir-822 Firmware 3.10b06
D-link Dir-860l Firmware 2.03.b03
D-link Dir-868l Firmware 2.05b02
D-link Dir-880l Firmware 1.20b01 01 I3se
D-link Dir-890l/r Firmware 1.21b02
2 Github repositories
9.8
CVSSv3
CVE-2016-5681
Stack-based buffer overflow in dws/api/Login on D-Link DIR-850L B1 2.07 prior to 2.07WWB05, DIR-817 Ax, DIR-818LW Bx prior to 2.05b03beta03, DIR-822 C1 3.01 prior to 3.01WWb02, DIR-823 A1 1.00 prior to 1.00WWb05, DIR-895L A1 1.11 prior to 1.11WWb04, DIR-890L A1 1.09 prior to 1.09...
Dlink Dir-868l Firmware
Dlink Dir-822 Firmware 3.01
D-link Dir-880l Firmware
D-link Dir-850l Firmare
D-link Dir-895l Firmware
D-link Dir-817l(w) Firmware
D-link Dir-818l(w) Firmware
D-link Dir-890l Firmware
D-link Dir-823 Firmware
D-link Dir-885l Firmware
9.8
CVSSv3
CVE-2023-51984
D-Link DIR-822+ V1.0.2 was found to contain a command injection in SetStaticRouteSettings function. allows remote malicious users to execute arbitrary commands via shell.
Dlink Dir-822 Firmware 1.0.2
9.8
CVSSv3
CVE-2023-51989
D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows malicious users to log in to administrator accounts with empty passwords.
Dlink Dir-822 Firmware 1.0.2
9.8
CVSSv3
CVE-2023-51987
D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows malicious users to log in to administrator accounts with empty passwords.
Dlink Dir-822 Firmware 1.0.2
9.8
CVSSv3
CVE-2018-20675
D-Link DIR-822 C1 before v3.11B01Beta, DIR-822-US C1 before v3.11B01Beta, DIR-850L A* before v1.21B08Beta, DIR-850L B* before v2.22B03Beta, and DIR-880L A* before v1.20B02Beta devices allow authentication bypass.
Dlink Dir-822 Firmware
Dlink Dir-822-us Firmware
Dlink Dir-850l Firmware
Dlink Dir-850l Firmware 2.22b02
Dlink Dir-880l Firmware
Dlink Dir-880l Firmware 1.20b01
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »