CVE-2019-18852
https://notcve.org/view.php?id=CVE-2019-18852
Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00. Determinados dispositivos D-Link, poseen una cuenta de usuario de Alphanetworks embebida con acceso de TELNET debido a etc/config/image_sign o /etc/alpha_config/image_sign. Esto afecta a DIR-600 B1 versión V2.01 para WW, DIR-890L A1 versión v1.03, DIR-615 J1 versión v100 (para DCN), DIR-645 A1 versión v1.03, DIR-815 A1 versión v1.01, DIR-823 A1 versión v1.01 y DIR-842 C1 versión v3.00. • https://github.com/ChandlerChin/Dlink_vuls/blob/master/A%20hard%20coded%20telnet%20user%20was%20discovered%20in%20multiple%20Dlink%20routers.pdf • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2013-7471
https://notcve.org/view.php?id=CVE-2013-7471
An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request. Se descubrió un problema en soap.cgi? • http://www.s3cur1ty.de/m1adv2013-020 https://www.exploit-db.com/exploits/27044 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2015-2052
https://notcve.org/view.php?id=CVE-2015-2052
Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface. Desbordamiento de buffer basado en pila en el router DIR-645 Wired/Wireless Rev. Ax con firmware 1.04b12 y anteriores permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en una acción GetDeviceSettings en la interfaz HNAP. • http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051 http://www.securityfocus.com/bid/72623 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2051 – D-Link DIR-645 Router Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2051
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. El router D-Link DIR-645 Wired/Wireless Rev. Ax con firmware 1.04b12 y anteriores permite a atacantes remotos ejecutar comandos arbitrarios a través de una acción GetDeviceSettings en la interfaz HNAP. D-Link DIR-645 Wired/Wireless Router allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. • https://www.exploit-db.com/exploits/37171 http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051 http://www.securityfocus.com/bid/72623 http://www.securityfocus.com/bid/74870 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2013-7389 – D-Link DIR-645 1.03B08 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-7389
Multiple cross-site scripting (XSS) vulnerabilities in D-Link DIR-645 Router (Rev. A1) with firmware before 1.04B11 allow remote attackers to inject arbitrary web script or HTML via the (1) deviceid parameter to parentalcontrols/bind.php, (2) RESULT parameter to info.php, or (3) receiver parameter to bsc_sms_send.php. Múltiples vulnerabilidades de XSS en D-Link DIR-645 Router (Rev. A1) con firmware anterior a 1.04B11 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de (1) el parámetro deviceid en parentalcontrols/bind.php, (2) el parámetro RESULT en info.php o (3) el parámetro receiver en bsc_sms_send.php. • https://www.exploit-db.com/exploits/27283 http://osvdb.org/show/osvdb/95910 http://osvdb.org/show/osvdb/95952 http://osvdb.org/show/osvdb/95953 http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008 http://www.securityfocus.com/bid/61579 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •