Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dlink dsl-2640b - vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2020-9275
An issue exists on D-Link DSL-2640B B2 EU_4.01B devices. A cfm UDP service listening on port 65002 allows remote, unauthenticated exfiltration of administrative credentials.
Dlink Dsl-2640b Firmware Eu 4.01b
7.5
CVSSv2
CVE-2020-9277
An issue exists on D-Link DSL-2640B B2 EU_4.01B devices. Authentication can be bypassed when accessing cgi modules. This allows one to perform administrative tasks (e.g., modify the admin password) with no authentication.
Dlink Dsl-2640b Firmware Eu 4.01b
9
CVSSv2
CVE-2020-9276
An issue exists on D-Link DSL-2640B B2 EU_4.01B devices. The function do_cgi(), which processes cgi requests supplied to the device's web servers, is vulnerable to a remotely exploitable stack-based buffer overflow. Unauthenticated exploitation is possible by combining this ...
Dlink Dsl-2640b Firmware Eu 4.01b
6.4
CVSSv2
CVE-2020-9278
An issue exists on D-Link DSL-2640B B2 EU_4.01B devices. The device can be reset to its default configuration by accessing an unauthenticated URL.
Dlink Dsl-2640b Firmware Eu 4.01b
10
CVSSv2
CVE-2020-9279
An issue exists on D-Link DSL-2640B B2 EU_4.01B devices. A hard-coded account allows management-interface login with high privileges. The logged-in user can perform critical tasks and take full control of the device.
Dlink Dsl-2640b Firmware Eu 4.01b
6.8
CVSSv2
CVE-2012-1308
Cross-site request forgery (CSRF) vulnerability in redpass.cgi in D-Link DSL-2640B Firmware EU_4.00 allows remote malicious users to hijack the authentication of administrators for requests that change the administrator password via the sysPassword parameter.
Dlink Dsl-2640b Firmware 4.00
Dlink Dsl-2640b -
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started