
CVE-2021-46442
https://notcve.org/view.php?id=CVE-2021-46442
27 Apr 2022 — In the "webupg" binary of D-Link DIR-825 G1, attackers can bypass authentication through parameters "autoupgrade.asp", and perform functions such as downloading configuration files and updating firmware without authorization. En el binario "webupg" del D-Link DIR-825 G1, los atacantes pueden omitir la autenticación mediante los parámetros "autoupgrade.asp", y llevar a cabo funciones como la descarga de archivos de configuración y la actualización del firmware sin autorización • https://github.com/tgp-top/D-Link-DIR-825 •

CVE-2021-29296
https://notcve.org/view.php?id=CVE-2021-29296
10 Aug 2021 — Null Pointer Dereference vulnerability in D-Link DIR-825 2.10b02, which could let a remote malicious user cause a denial of service. The vulnerability could be triggered by sending an HTTP request with URL /vct_wan; the sbin/httpd would invoke the strchr function and take NULL as a first argument, which finally leads to the segmentation fault. NOTE: The DIR-825 and all hardware revisions is considered End of Life and as such this issue will not be patched Vulnerabilidad de Desreferencia de Puntero Null en D... • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10212 • CWE-476: NULL Pointer Dereference •

CVE-2020-29557 – D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2020-29557
29 Jan 2021 — An issue was discovered on D-Link DIR-825 R1 devices through 3.0.1 before 2020-11-20. A buffer overflow in the web interface allows attackers to achieve pre-authentication remote code execution. Se detectó un problema en los dispositivos D-Link DIR-825 R1 versiones hasta 3.0.1 antes del 20-11-2020. Un desbordamiento del búfer en la interfaz web permite a atacantes lograr una ejecución de código remota antes de la autenticación D-Link DIR-825 R1 devices contain a buffer overflow vulnerability in the web... • https://shaqed.github.io/dlink • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2020-10214
https://notcve.org/view.php?id=CVE-2020-10214
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. There is a stack-based buffer overflow in the httpd binary. It allows an authenticated user to execute arbitrary code via a POST to ntp_sync.cgi with a sufficiently long parameter ntp_server. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Se presenta un desbordamiento de búfer en la región stack de la memoria en el binario httpd. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability4.md • CWE-787: Out-of-bounds Write •

CVE-2020-10215
https://notcve.org/view.php?id=CVE-2020-10215
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Permiten a atacantes remotos ejecutar comandos arbitrarios por medio del parámetro dns_query_name en una petición POST del archivo dns_query.cgi. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability2.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-10216
https://notcve.org/view.php?id=CVE-2020-10216
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Permiten a atacantes remotos ejecutar comandos arbitrarios por medio del parámetro date en una petición POST del archivo system_time.cgi. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability1.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-10213
https://notcve.org/view.php?id=CVE-2020-10213
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Permiten a atacantes remotos ejecutar comandos arbitrarios por medio del parámetro wps_sta_enrollee_pin en una petición POST del archivo set_sta_enrollee_pin.cgi. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability3.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-13263
https://notcve.org/view.php?id=CVE-2019-13263
27 Aug 2019 — D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with an ACK or NAK message. Studying the NAK case revealed that the router erroneously sends the NAK to both Host and Guest networks with the same Transaction ID as found in the DHCP Request. This allows encoding of data to be sent cross-... • https://orenlab.sise.bgu.ac.il/publications/CrossRouter • CWE-669: Incorrect Resource Transfer Between Spheres •

CVE-2019-13264
https://notcve.org/view.php?id=CVE-2019-13264
27 Aug 2019 — D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely co... • https://orenlab.sise.bgu.ac.il/publications/CrossRouter •

CVE-2019-13265
https://notcve.org/view.php?id=CVE-2019-13265
27 Aug 2019 — D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these rout... • https://orenlab.sise.bgu.ac.il/publications/CrossRouter •