Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dlink dir-600m firmware 3.04 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2020-13960
D-Link DSL 2730-U IN_1.10 and IN_1.11 and DIR-600M 3.04 devices have the domain.name string in the DNS resolver search path by default, which allows remote malicious users to provide valid DNS responses (and also offer Internet services such as HTTP) for names that otherwise woul...
Dlink Dsl-2730u Firmware In 1.10
Dlink Dir-600m Firmware 3.04
9.8
CVSSv3
CVE-2019-13101
An issue exists on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an malicious user to modify the data fields of the page.
Dlink Dir-600m Firmware 3.02
Dlink Dir-600m Firmware 3.03
Dlink Dir-600m Firmware 3.04
Dlink Dir-600m Firmware 3.06
1 EDB exploit
1 Github repository
9.8
CVSSv3
CVE-2019-7736
D-Link DIR-600M C1 3.04 devices allow authentication bypass via a direct request to the wan.htm page. NOTE: this may overlap CVE-2019-13101.
Dlink Dir-600m Firmware 3.04
8.8
CVSSv3
CVE-2017-9100
login.cgi on D-Link DIR-600M devices with firmware 3.04 allows remote malicious users to bypass authentication by entering more than 20 blank spaces in the password field during an admin login attempt.
Dlink Dir-600m Firmware 3.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started