2 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 3

On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal. En los dispositivos D-Link DIR-615, un usuario normal es capaz de crear un usuario root(admin) desde el portal de D-Link. • https://www.exploit-db.com/exploits/47778 http://seclists.org/fulldisclosure/2019/Dec/35 https://pastebin.com/wHiRGdEG https://www.dlink.com/en/security-bulletin https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routervertical.html •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 3

D-Link DIR-615 T1 devices allow XSS via the Add User feature. Los dispositivos D-Link DIR-615 T1 permiten Cross-Site Scripting (XSS) mediante la característica Add User. The D-Link DIR-615 wireless router suffers from a persistent cross site scripting vulnerability. • https://www.exploit-db.com/exploits/44473 http://packetstormsecurity.com/files/147184/D-Link-DIR-615-Cross-Site-Scripting.html https://hacksayan.wordpress.com/d-link-dir-615-wireless-router-persistent-cross-site-scripting-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •