Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dlink dir-823g firmware 1.0.2b05 vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2019-15527
An issue exists on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the MaxIdTime field to SetWanSettings.
Dlink Dir-823g Firmware 1.0.2b05
9
CVSSv2
CVE-2019-15528
An issue exists on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the Interface field to SetStaticRouteSettings.
Dlink Dir-823g Firmware 1.0.2b05
9
CVSSv2
CVE-2019-15529
An issue exists on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the Username field to Login.
Dlink Dir-823g Firmware 1.0.2b05
9
CVSSv2
CVE-2019-15530
An issue exists on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the LoginPassword field to Login.
Dlink Dir-823g Firmware 1.0.2b05
7.5
CVSSv2
CVE-2020-25367
A command injection vulnerability exists in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the Captcha field to Login.
Dlink Dir-823g Firmware 1.0.2b05
9
CVSSv2
CVE-2019-15526
An issue exists on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the Type field to SetWanSettings, a related issue to CVE-2019-13482.
Dlink Dir-823g Firmware 1.0.2b05
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started