Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Total 1257 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-28729 1 Dlink 2 Dwr-2000m, Dwr-2000m Firmware 2024-11-22 N/A 9.8 CRITICAL
An issue in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to execute arbitrary code via a crafted request.
CVE-2024-52759 1 Dlink 2 Di-8003, Di-8003 Firmware 2024-11-22 N/A 9.8 CRITICAL
D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function.
CVE-2024-52757 1 Dlink 2 Di-8003, Di-8003 Firmware 2024-11-22 N/A 4.9 MEDIUM
D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the notify parameter in the arp_sys_asp function.
CVE-2024-52755 1 Dlink 2 Di-8003, Di-8003 Firmware 2024-11-22 N/A 4.9 MEDIUM
D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the host_ip parameter in the ipsec_road_asp function.
CVE-2024-52754 1 Dlink 2 Di-8003, Di-8003 Firmware 2024-11-22 N/A 4.9 MEDIUM
D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function.
CVE-2024-51151 1 Dlink 2 Di-8200, Di-8200 Firmware 2024-11-22 N/A 9.8 CRITICAL
D-Link DI-8200 16.07.26A1 is vulnerable to remote command execution in the msp_info_htm function via the flag parameter and cmd parameter.
CVE-2024-28730 1 Dlink 2 Dwr-2000m, Dwr-2000m Firmware 2024-11-22 N/A 5.4 MEDIUM
Cross Site Scripting vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via the file upload feature of the VPN configuration module.
CVE-2024-6525 1 Dlink 2 Dar-7000, Dar-7000 Firmware 2024-11-21 3.3 LOW 2.7 LOW
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20230922. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270368. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2024-39202 1 Dlink 2 Dir-823x Ax3000, Dir-823x Ax3000 Firmware 2024-11-21 N/A 8.8 HIGH
D-Link DIR-823X firmware - 240126 was discovered to contain a remote command execution (RCE) vulnerability via the dhcpd_startip parameter at /goform/set_lan_settings.
CVE-2024-38438 1 Dlink 2 Dsl-225, Dsl-225 Firmware 2024-11-21 N/A 9.8 CRITICAL
D-Link - CWE-294: Authentication Bypass by Capture-replay
CVE-2024-38437 1 Dlink 2 Dsl-225, Dsl-225 Firmware 2024-11-21 N/A 9.8 CRITICAL
D-Link - CWE-288:Authentication Bypass Using an Alternate Path or Channel
CVE-2024-24321 1 Dlink 2 Dir-816, Dir-816 Firmware 2024-11-21 N/A 9.8 CRITICAL
An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function.
CVE-2024-23625 1 Dlink 2 Dap-1650, Dap-1650 Firmware 2024-11-21 8.3 HIGH 9.6 CRITICAL
A command injection vulnerability exists in D-Link DAP-1650 devices when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.
CVE-2024-23624 1 Dlink 2 Dap-1650, Dap-1650 Firmware 2024-11-21 8.3 HIGH 9.6 CRITICAL
A command injection vulnerability exists in the gena.cgi module of D-Link DAP-1650 devices. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.
CVE-2024-22916 1 Dlink 2 Go-rt-ac750, Go-rt-ac750 Firmware 2024-11-21 N/A 9.8 CRITICAL
In D-LINK Go-RT-AC750 v101b03, the sprintf function in the sub_40E700 function within the cgibin is susceptible to stack overflow.
CVE-2024-22853 1 Dlink 2 Go-rt-ac750, Go-rt-ac750 Firmware 2024-11-21 N/A 9.8 CRITICAL
D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.
CVE-2024-22751 1 Dlink 2 Dir-882 A1, Dir-882 A1 Firmware 2024-11-21 N/A 9.8 CRITICAL
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the sub_477AA0 function.
CVE-2024-22651 1 Dlink 2 Dir-815, Dir-815 Firmware 2024-11-21 N/A 9.8 CRITICAL
There is a command injection vulnerability in the ssdpcgi_main function of cgibin binary in D-Link DIR-815 router firmware v1.04.
CVE-2024-0921 1 Dlink 2 Dir-816 A2, Dir-816 A2 Firmware 2024-11-21 5.8 MEDIUM 4.7 MEDIUM
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139.
CVE-2024-0769 1 Dlink 2 Dir-859, Dir-859 Firmware 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.