Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dir-615_t1_firmware vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2019-19743
On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal.
Dlink Dir-615 T1 Firmware 20.07
4.8
CVSSv3
CVE-2018-10110
D-Link DIR-615 T1 devices allow XSS via the Add User feature.
D-link Dir-615 T1 Firmware 20.07
1 EDB exploit
9.8
CVSSv3
CVE-2021-42627
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage malicious user to modify the data fields of page.
Dlink Dir-615 Firmware 20.06
Dlink Dir-615 J1 Firmware 20.06
Dlink Dir-615 T1 Firmware 20.06
Dlink Dir-615jx10 Firmware 20.06
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started