Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dlink dir-868l firmware vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-7642
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), ...
Dlink Dir-817lw Firmware 1.04
Dlink Dir-816l Firmware 2.06
Dlink Dir-816 Firmware 2.06
Dlink Dir-850l Firmware 1.09
Dlink Dir-868l Firmware 1.10
2 Github repositories
10
CVSSv2
CVE-2018-9284
authentication.cgi on D-Link DIR-868L devices with Singapore StarHub firmware before v1.21SHCb03 allows remote malicious users to execute arbitrary code.
Dlink Singapore Starhub Firmware
NA
CVE-2023-29856
D-Link DIR-868L Hardware version A1, firmware version 1.12 is vulnerable to Buffer Overflow. The vulnerability is in scandir.sgi binary.
Dlink Dir-868l Firmware 1.12
5
CVSSv2
CVE-2020-29321
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated malicious user to gain access to the firmware and to extract sensitive data.
Dlink Dir-868l Firmware 3.01
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started