CVE-2023-49004
https://notcve.org/view.php?id=CVE-2023-49004
An issue in D-Link DIR-850L v.B1_FW223WWb01 allows a remote attacker to execute arbitrary code via a crafted script to the en parameter. Un problema en D-Link DIR-850L v.B1_FW223WWb01 permite a un atacante remoto ejecutar código arbitrario a través de un script manipualdo para el parámetro en. • https://github.com/ef4tless/vuln/blob/master/iot/DIR-850L/bug1.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2017-14422
https://notcve.org/view.php?id=CVE-2017-14422
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation. Los dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •
CVE-2017-14415
https://notcve.org/view.php?id=CVE-2017-14415
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/sitesurvey.php. Los dispositivos D-Link DIR-850L REV. A con versiones de firmware hasta FW114WWb07_h2ab_beta1 tienen una vulnerabilidad de Cross-Site Scripting (XSS) en el parámetro action para htdocs/web/sitesurvey.php. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-14427
https://notcve.org/view.php?id=CVE-2017-14427
D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/storage_account_root permissions. Los dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-276: Incorrect Default Permissions •
CVE-2017-14421
https://notcve.org/view.php?id=CVE-2017-14421
D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session. Los dispositivos D-Link DIR-850L REV. B (con firmware hasta la versión FW208WWb02) tienen una contraseña embebida de wrgac25_dlink.2013gui_dir850l para la cuenta Alphanetworks al restablecer el dispositivo, lo que permite que atacantes remotos obtengan acceso root mediante una sesión TELNET. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •