Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dlink dir-600m firmware 3.04 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2020-13960
D-Link DSL 2730-U IN_1.10 and IN_1.11 and DIR-600M 3.04 devices have the domain.name string in the DNS resolver search path by default, which allows remote malicious users to provide valid DNS responses (and also offer Internet services such as HTTP) for names that otherwise woul...
Dlink Dsl-2730u Firmware In 1.10
Dlink Dir-600m Firmware 3.04
7.5
CVSSv2
CVE-2019-13101
An issue exists on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an malicious user to modify the data fields of the page.
Dlink Dir-600m Firmware 3.02
Dlink Dir-600m Firmware 3.03
Dlink Dir-600m Firmware 3.04
Dlink Dir-600m Firmware 3.06
1 EDB exploit
1 Github repository
7.5
CVSSv2
CVE-2019-7736
D-Link DIR-600M C1 3.04 devices allow authentication bypass via a direct request to the wan.htm page. NOTE: this may overlap CVE-2019-13101.
Dlink Dir-600m Firmware 3.04
8.3
CVSSv2
CVE-2017-9100
login.cgi on D-Link DIR-600M devices with firmware 3.04 allows remote malicious users to bypass authentication by entering more than 20 blank spaces in the password field during an admin login attempt.
Dlink Dir-600m Firmware 3.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started