Page 2 of 8 results (0.006 seconds)

CVSS: 10.0EPSS: 7%CPEs: 2EXPL: 1

Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface. Desbordamiento de buffer basado en pila en el router DIR-645 Wired/Wireless Rev. Ax con firmware 1.04b12 y anteriores permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en una acción GetDeviceSettings en la interfaz HNAP. • http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051 http://www.securityfocus.com/bid/72623 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 96%CPEs: 2EXPL: 2

The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. El router D-Link DIR-645 Wired/Wireless Rev. Ax con firmware 1.04b12 y anteriores permite a atacantes remotos ejecutar comandos arbitrarios a través de una acción GetDeviceSettings en la interfaz HNAP. D-Link DIR-645 Wired/Wireless Router allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. • https://www.exploit-db.com/exploits/37171 http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051 http://www.securityfocus.com/bid/72623 http://www.securityfocus.com/bid/74870 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in D-Link DIR-645 Router (Rev. A1) with firmware before 1.04B11 allow remote attackers to inject arbitrary web script or HTML via the (1) deviceid parameter to parentalcontrols/bind.php, (2) RESULT parameter to info.php, or (3) receiver parameter to bsc_sms_send.php. Múltiples vulnerabilidades de XSS en D-Link DIR-645 Router (Rev. A1) con firmware anterior a 1.04B11 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de (1) el parámetro deviceid en parentalcontrols/bind.php, (2) el parámetro RESULT en info.php o (3) el parámetro receiver en bsc_sms_send.php. • https://www.exploit-db.com/exploits/27283 http://osvdb.org/show/osvdb/95910 http://osvdb.org/show/osvdb/95952 http://osvdb.org/show/osvdb/95953 http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008 http://www.securityfocus.com/bid/61579 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •