Page 3 of 18 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

htdocs/parentalcontrols/bind.php on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices does not prevent unauthenticated nonce-guessing attacks, which makes it easier for remote attackers to change the DNS configuration via a series of requests. htdocs/parentalcontrols/bind.php en dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) no evita ataques de adivinación de nonces, lo que facilita que atacantes remotos cambien la configuración de DNS mediante una serie de peticiones. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

register_send.php on D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices does not require authentication, which can result in unintended enrollment in mydlink Cloud Services. register_send.php en dispositivos D-Link DIR-850L REV. B (con firmware hasta la versión FW208WWb02) no requiere autenticación, lo que puede resultar en una inscripción involuntaria en mydlink Cloud Services. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0644 /var/etc/shadow (aka the /etc/shadow symlink target) permissions. Los dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •

CVSS: 5.9EPSS: 0%CPEs: 5EXPL: 1

The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established. La extensión D-Link NPAPI, tal y como se emplea conjuntamente con dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-295: Improper Certificate Validation •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/hostapd* permissions. Los dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •