Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dlink dir-868l firmware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-39665
D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 exists to contain a buffer overflow via the acStack_50 parameter.
Dlink Dir-868l Firmware 1.12 Eu Multi 20170316
NA
CVE-2023-39667
D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 exists to contain a buffer overflow via the param_2 parameter in the FUN_0000acb4 function.
Dlink Dir-868l Firmware 1.12 Eu Multi 20170316
NA
CVE-2023-39668
D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 exists to contain a buffer overflow via the param_2 parameter in the inet_ntoa() function.
Dlink Dir-868l Firmware 1.12 Eu Multi 20170316
NA
CVE-2023-29856
D-Link DIR-868L Hardware version A1, firmware version 1.12 is vulnerable to Buffer Overflow. The vulnerability is in scandir.sgi binary.
Dlink Dir-868l Firmware 1.12
5
CVSSv2
CVE-2020-29321
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated malicious user to gain access to the firmware and to extract sensitive data.
Dlink Dir-868l Firmware 3.01
5
CVSSv2
CVE-2019-20213
D-Link DIR-859 routers before v1.07b03_beta allow Unauthenticated Information Disclosure via the AUTHORIZED_GROUP=1%0a value, as demonstrated by vpnconfig.php.
Dlink Dir-859 Firmware
Dlink Dir-859 Firmware 1.06b01
Dlink Dir-822 Firmware
Dlink Dir-823 Firmware
Dlink Dir-865l Firmware
Dlink Dir-868l Firmware
Dlink Dir-869 Firmware
Dlink Dir-880l Firmware
Dlink Dir-890l Firmware
Dlink Dir-890r Firmware
Dlink Dir-885l Firmware
Dlink Dir-885r Firmware
Dlink Dir-895l Firmware
Dlink Dir-895r Firmware
Dlink Dir-818lx Firmware -
10
CVSSv2
CVE-2019-17621
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote malicious user to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local ne...
Dlink Dir-859 Firmware
Dlink Dir-859 Firmware 1.06b01
Dlink Dir-822 Firmware
Dlink Dir-823 Firmware
Dlink Dir-823 Firmware 1.00b06
Dlink Dir-865l Firmware
Dlink Dir-868l Firmware
Dlink Dir-869 Firmware
Dlink Dir-869 Firmware 1.03b02
Dlink Dir-880l Firmware
Dlink Dir-890l Firmware
Dlink Dir-890l Firmware 1.11b01
Dlink Dir-890r Firmware
Dlink Dir-890r Firmware 1.11b01
Dlink Dir-885l Firmware
Dlink Dir-885r Firmware
Dlink Dir-895l Firmware
Dlink Dir-895r Firmware
Dlink Dir-818lx Firmware -
7 Github repositories
7.5
CVSSv2
CVE-2017-14948
Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L 1.08B04 and DIR-895 L/R 1.13b03. The impact is: execute arbitrary code (remote). The component is: htdocs/fileaccess.cgi. The attack vector is: A crafted HTTP request handled by fileacces.cgi could al...
Dlink Dir-868l Firmware -
Dlink Dir-890l Firmware -
Dlink Dir-885l Firmware -
Dlink Dir-895l Firmware 1.13b03
Dlink Dir-880l Firmware 1.08b04
Dlink Dir-895r Firmware 1.13b03
1 Github repository
10
CVSSv2
CVE-2019-17506
There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_G...
Dlink Dir-868l B1 Firmware 2.03
Dlink Dir-817lw A1 Firmware 1.04
7.5
CVSSv2
CVE-2019-16190
SharePort Web Access on D-Link DIR-868L REVB up to and including 2.03, DIR-885L REVA up to and including 1.20, and DIR-895L REVA up to and including 1.21 devices allows Authentication Bypass, as demonstrated by a direct request to folder_view.php or category_view.php.
Dlink Dir-868l Firmware
Dlink Dir-885l Firmware
Dlink Dir-895l Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »