Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dlink dir-868l firmware - vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-7642
D-Link routers with the mydlink feature have some web interfaces without authentication requirements. An attacker can remotely obtain users' DNS query logs and login logs. Vulnerable targets include but are not limited to the latest firmware versions of DIR-817LW (A1-1.04), ...
Dlink Dir-817lw Firmware 1.04
Dlink Dir-816l Firmware 2.06
Dlink Dir-816 Firmware 2.06
Dlink Dir-850l Firmware 1.09
Dlink Dir-868l Firmware 1.10
2 Github repositories
9.8
CVSSv3
CVE-2018-9284
authentication.cgi on D-Link DIR-868L devices with Singapore StarHub firmware before v1.21SHCb03 allows remote malicious users to execute arbitrary code.
Dlink Singapore Starhub Firmware
9.8
CVSSv3
CVE-2023-29856
D-Link DIR-868L Hardware version A1, firmware version 1.12 is vulnerable to Buffer Overflow. The vulnerability is in scandir.sgi binary.
Dlink Dir-868l Firmware 1.12
7.5
CVSSv3
CVE-2020-29321
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated malicious user to gain access to the firmware and to extract sensitive data.
Dlink Dir-868l Firmware 3.01
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started