Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dir-619l_firmware vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2023-43867
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanL2TP function.
Dlink Dir-619l Firmware 2.02
7.5
CVSSv3
CVE-2023-43868
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via websGetVar function.
Dlink Dir-619l Firmware 2.02
9.8
CVSSv3
CVE-2023-43869
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 function.
Dlink Dir-619l Firmware 2.02
9.8
CVSSv3
CVE-2023-37791
D-Link DIR-619L v2.04(TW) exists to contain a stack overflow via the curTime parameter at /goform/formLogin.
Dlink Dir-619l Firmware 2.04
9.8
CVSSv3
CVE-2018-20056
An issue exists in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. There is a stack-based buffer overflow allowing remote malicious users to execute arbitrary code without authentication via the goform/formLanguageChange currTime parameter.
D-link Dir-619l Firmware 2.06b1
D-link Dir-605l Firmware 2.12b1
8.8
CVSSv3
CVE-2018-20057
An issue exists in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. goform/formSysCmd allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter.
D-link Dir-619l Firmware 2.06b1
D-link Dir-605l Firmware 2.12b1
NA
CVE-2014-8361
The miniigd SOAP service in Realtek SDK allows remote malicious users to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild up to and including 2023.
Dlink Dir-905l Firmware
Dlink Dir-605l Firmware
Dlink Dir-600l Firmware
Realtek Realtek Sdk -
Dlink Dir-619l Firmware
Dlink Dir-809 Firmware
1 EDB exploit
1 Github repository
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2