Page 2 of 25 results (0.004 seconds)

CVSS: 9.8EPSS: 92%CPEs: 3EXPL: 1

An authentication bypass vulnerability on D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router (Hardware Version : A1, B1; Firmware Version : 1.02-2.06) devices potentially allows attackers to bypass SharePort Web Access Portal by directly visiting /category_view.php or /folder_view.php. Una vulnerabilidad de omisión de autenticación en dispositivos D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router (Hardware Version: A1, B1; Firmware Version: 1.02-2.06) podría permitir que los atacantes omitan el portal de acceso web SharePort visitando directamente /category_view.php o /folder_view.php. • https://www.exploit-db.com/exploits/44378 https://www.youtube.com/watch?v=Wmm4p8znS3s • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

Multiple D-Link devices including the DIR-850L firmware versions 1.14B07 and 2.07.B05 contain a stack-based buffer overflow vulnerability in the web administration interface HNAP service. Múltiples dispositivos D-Link, incluidos DIR-850L con versiones 1.13B07 y 2.07.B05 contienen una vulnerabilidad de desbordamiento de búfer basado en pila en la interfaz de administración web del servicio HNAP. • http://www.securityfocus.com/bid/96747 https://tools.cisco.com/security/center/viewAlert.x?alertId=52967 https://twitter.com/NCCGroupInfosec/status/845269159277723649 https://www.kb.cert.org/vuls/id/305448 https://www.nccgroup.trust/uk/our-research/d-link-dir-850l-web-admin-interface-vulnerable-to-stack-based-buffer-overflow/?research=Technical+advisories • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 1

D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation. Los dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/storage_account_root permissions. Los dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-276: Incorrect Default Permissions •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 1

D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session. Los dispositivos D-Link DIR-850L REV. B (con firmware hasta la versión FW208WWb02) tienen una contraseña embebida de wrgac25_dlink.2013gui_dir850l para la cuenta Alphanetworks al restablecer el dispositivo, lo que permite que atacantes remotos obtengan acceso root mediante una sesión TELNET. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •