Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
d-link vulnerabilities and exploits
(subscribe to this query)
891
VMScore
CVE-2018-19990
In the /HNAP1/SetWiFiVerifyAlpha message, the WPSPIN parameter is vulnerable, and the vulnerability affects D-Link DIR-822 B1 202KRb06 devices. In the SetWiFiVerifyAlpha.php source code, the WPSPIN parameter is saved in the $rphyinf1."/media/wps/enrollee/pin" and $rphyi...
D-link Dir-822 Firmware 202krb06
668
VMScore
CVE-2018-20305
D-Link DIR-816 A2 1.10 B05 devices allow arbitrary remote code execution without authentication via the newpass parameter. In the /goform/form2userconfig.cgi handler function, a long password may lead to a stack-based buffer overflow and overwrite a return address.
D-link Dir-816 A2 Firmware 1.10b05
890
VMScore
CVE-2021-26709
D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote malicious users to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supp...
D-link Dsl-320b-d1
855
VMScore
CVE-2017-5633
Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote malicious users to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI progr...
D-link Di-524 Firmware 9.01
1 EDB exploit
1 Github repository
383
VMScore
CVE-2017-10676
On D-Link DIR-600M devices before C1_v3.05ENB01_beta_20170306, XSS was found in the form2userconfig.cgi username parameter.
D-link Dir-600m Firmware Fw3.05b01
890
VMScore
CVE-2001-1220
D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point stores the administrative password in plaintext in the default Management Information Base (MIB), which allows remote malicious users to gain administrative privileges.
D-link Dwl-1000ap 3.2.28 483
445
VMScore
CVE-2001-1221
D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point uses a default SNMP community string of 'public' which allows remote malicious users to gain sensitive information.
D-link Dwl-1000ap 3.2.28 483
785
VMScore
CVE-2006-6538
D-LINK DWL-2000AP+ firmware 2.11 allows remote malicious users to cause (1) a denial of service (device reset) via a flood of ARP replies on the wired or wireless (radio) link and (2) a denial of service (device crash) via a flood of ARP requests on the wireless link.
D-link Dwl-2000ap\\+ 2.11
1 EDB exploit
445
VMScore
CVE-2020-9544
An issue exists on D-Link DSL-2640B E1 EU_1.01 devices. The administrative interface doesn't perform authentication checks for a firmware-update POST request. Any attacker that can access the administrative interface can install firmware of their choice.
D-link Dsl-2640b Firmware E1 Eu 1.01
NA
CVE-2022-44929
An access control issue in D-Link DVG-G5402SP GE_1.03 allows unauthenticated malicious users to escalate privileges via arbitrarily editing VoIP SIB profiles.
D-link Dvg-g5402sp Firmware Ge 1.03
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »