Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
d-link vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2007-1435
Buffer overflow in D-Link TFTP Server 1.0 allows remote malicious users to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third pa...
D-link Tftp Server 1.0
2 EDB exploits
7.5
CVSSv2
CVE-2018-19988
In the /HNAP1/SetClientInfoDemo message, the AudioMute and AudioEnable parameters are vulnerable, and the vulnerabilities affect D-Link DIR-868L Rev.B 2.05B02 devices. In the SetClientInfoDemo.php source code, the AudioMute and AudioEnble parameters are saved in the ShellPath scr...
D-link Dir-868l Firmware 2.05b02
10
CVSSv2
CVE-2018-19990
In the /HNAP1/SetWiFiVerifyAlpha message, the WPSPIN parameter is vulnerable, and the vulnerability affects D-Link DIR-822 B1 202KRb06 devices. In the SetWiFiVerifyAlpha.php source code, the WPSPIN parameter is saved in the $rphyinf1."/media/wps/enrollee/pin" and $rphyi...
D-link Dir-822 Firmware 202krb06
5
CVSSv2
CVE-2021-33259
Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for malicious users to obtain users' DNS query history.
D-link Dir-868lw Firmware 1.12b
9
CVSSv2
CVE-2018-16408
D-Link DIR-846 devices with firmware 100.26 allow remote malicious users to execute arbitrary code as root via a SetNetworkTomographySettings request by leveraging admin access.
D-link Dir-846 Firmware 100.26
3.5
CVSSv2
CVE-2018-6936
Cross Site Scripting (XSS) exists on the D-Link DIR-600M C1 3.01 via the SSID or the name of a user account.
D-link Dir-600m C1 Firmware 3.01
1 EDB exploit
4.3
CVSSv2
CVE-2017-10676
On D-Link DIR-600M devices before C1_v3.05ENB01_beta_20170306, XSS was found in the form2userconfig.cgi username parameter.
D-link Dir-600m Firmware Fw3.05b01
7.8
CVSSv2
CVE-2006-6538
D-LINK DWL-2000AP+ firmware 2.11 allows remote malicious users to cause (1) a denial of service (device reset) via a flood of ARP replies on the wired or wireless (radio) link and (2) a denial of service (device crash) via a flood of ARP requests on the wireless link.
D-link Dwl-2000ap\\+ 2.11
1 EDB exploit
10
CVSSv2
CVE-2001-1220
D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point stores the administrative password in plaintext in the default Management Information Base (MIB), which allows remote malicious users to gain administrative privileges.
D-link Dwl-1000ap 3.2.28 483
5
CVSSv2
CVE-2001-1221
D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point uses a default SNMP community string of 'public' which allows remote malicious users to gain sensitive information.
D-link Dwl-1000ap 3.2.28 483
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »