D-Link DSL-2750U 1.11 is affected by: Authentication Bypass. The impact is: denial of service and information leakage. The component is: login. NOTE: Third parties dispute this issues as not being a vulnerability because although the wizard is accessible without authentication, it can't actually configure anything. Thus, there is no denial of service or information leakage
Max CVSS
9.1
EPSS Score
3.40%
Published
2019-07-23
Updated
2024-04-11
On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal.
Max CVSS
6.5
EPSS Score
0.41%
Published
2019-12-16
Updated
2021-07-21
On D-Link DIR-615 devices, the User Account Configuration page is vulnerable to blind XSS via the name field.
Max CVSS
4.8
EPSS Score
0.92%
Published
2019-12-18
Updated
2021-04-23
D-Link DAP-1860 devices before v1.04b03 Beta allow access to administrator functions without authentication via the HNAP_AUTH header timestamp value. In HTTP requests, part of the HNAP_AUTH header is the timestamp used to determine the time when the user sent the request. If this value is equal to the value stored in the device's /var/hnap/timestamp file, the request will pass the HNAP_AUTH check function.
Max CVSS
8.8
EPSS Score
0.10%
Published
2019-12-05
Updated
2019-12-14
D-Link DAP-1860 devices before v1.04b03 Beta allow arbitrary remote code execution as root without authentication via shell metacharacters within an HNAP_AUTH HTTP header.
Max CVSS
8.8
EPSS Score
0.35%
Published
2019-12-05
Updated
2020-08-24
Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00.
Max CVSS
10.0
EPSS Score
0.62%
Published
2019-11-11
Updated
2020-08-24

CVE-2019-17621

Known exploited
Public exploit
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
Max CVSS
10.0
EPSS Score
97.16%
Published
2019-12-30
Updated
2023-01-20
CISA KEV Added
2023-06-29
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can clear the router's log file via act=clear&logtype=sysact to log_clear.php, which could be used to erase attack traces.
Max CVSS
9.1
EPSS Score
0.28%
Published
2019-10-16
Updated
2020-08-24
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can get the router's log file via log_get.php, which could be used to discover the intranet network structure.
Max CVSS
7.5
EPSS Score
0.28%
Published
2019-10-14
Updated
2020-08-24
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary OS commands as root by leveraging admin access and sending a /HNAP1/ request for SetWizardConfig with shell metacharacters to /squashfs-root/www/HNAP1/control/SetWizardConfig.php.
Max CVSS
10.0
EPSS Score
4.98%
Published
2019-10-11
Updated
2019-10-15
D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary OS commands as root by leveraging admin access and sending a /HNAP1/ request for SetMasterWLanSettings with shell metacharacters to /squashfs-root/www/HNAP1/control/SetMasterWLanSettings.php.
Max CVSS
10.0
EPSS Score
4.98%
Published
2019-10-11
Updated
2019-10-15
On D-Link DIR-859 A3-1.06 and DIR-850 A1.13 devices, /etc/services/DEVICE.TIME.php allows command injection via the $SERVER variable.
Max CVSS
10.0
EPSS Score
1.35%
Published
2019-10-11
Updated
2019-10-16
An issue was discovered on D-Link DIR-816 A1 1.06 devices. An attacker could access management pages of the router via a client that ignores the 'top.location.href = "/dir_login.asp"' line in a .asp file. This provides access to d_status.asp, version.asp, d_dhcptbl.asp, and d_acl.asp.
Max CVSS
7.5
EPSS Score
0.25%
Published
2019-10-11
Updated
2019-10-15
There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.
Max CVSS
10.0
EPSS Score
91.96%
Published
2019-10-11
Updated
2020-08-24
D-Link DAP-1320 A2-V1.21 routers have some web interfaces without authentication requirements, as demonstrated by uplink_info.xml. An attacker can remotely obtain a user's Wi-Fi SSID and password, which could be used to connect to Wi-Fi or perform a dictionary attack.
Max CVSS
7.5
EPSS Score
0.39%
Published
2019-10-11
Updated
2020-08-24
An issue discovered on D-Link DIR-615 devices with firmware version 20.05 and 20.07. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
Max CVSS
8.2
EPSS Score
0.21%
Published
2019-10-09
Updated
2021-04-23

CVE-2019-16920

Known exploited
Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.
Max CVSS
10.0
EPSS Score
96.31%
Published
2019-09-27
Updated
2019-10-10
CISA KEV Added
2022-03-25
D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product.
Max CVSS
9.8
EPSS Score
0.62%
Published
2019-12-26
Updated
2020-01-08
D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product.
Max CVSS
8.8
EPSS Score
0.31%
Published
2019-12-26
Updated
2020-01-08
SharePort Web Access on D-Link DIR-868L REVB through 2.03, DIR-885L REVA through 1.20, and DIR-895L REVA through 1.21 devices allows Authentication Bypass, as demonstrated by a direct request to folder_view.php or category_view.php.
Max CVSS
9.8
EPSS Score
0.62%
Published
2019-09-09
Updated
2021-04-23

CVE-2019-16057

Known exploited
Used for ransomware
The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.
Max CVSS
10.0
EPSS Score
97.52%
Published
2019-09-16
Updated
2019-09-16
CISA KEV Added
2022-04-15
An issue was discovered on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the LoginPassword field to Login.
Max CVSS
9.0
EPSS Score
0.22%
Published
2019-08-23
Updated
2020-08-24
An issue was discovered on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the Username field to Login.
Max CVSS
9.0
EPSS Score
0.22%
Published
2019-08-23
Updated
2020-08-24
An issue was discovered on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the Interface field to SetStaticRouteSettings.
Max CVSS
9.0
EPSS Score
0.22%
Published
2019-08-23
Updated
2020-08-24
An issue was discovered on D-Link DIR-823G devices with firmware V1.0.2B05. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the MaxIdTime field to SetWanSettings.
Max CVSS
9.0
EPSS Score
0.22%
Published
2019-08-23
Updated
2020-08-24
112 vulnerabilities found
1 2 3 4 5
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!