Page 77 of 846 results (0.010 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

D-Link DVX-2000MS contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. D-Link DVX-2000MS contiene credenciales embebidas para cuentas de usuario no documentadas en el archivo "/etc/passwd". Como se han usado contraseñas débiles, unas contraseñas en texto plano pueden ser recuperadas de los valores hash. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10236 https://www.dlink.com/en/security-bulletin https://www.nussko.com/advisories/advisory-2021-08-01.txt • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 1

D-Link DVG-3104MS version 1.0.2.0.3, 1.0.2.0.4, and 1.0.2.0.4E contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. NOTE: This vulnerability only affects products that are no longer supported by the maintainer D-Link DVG-3104MS versiones 1.0.2.0.3, 1.0.2.0.4 y 1.0.2.0.4E, contiene credenciales embebidas para cuentas de usuario no documentadas en el archivo "/etc/passwd". Como se han usado contraseñas débiles, unas contraseñas en texto plano pueden ser recuperadas de los valores hash. NOTA: Esta vulnerabilidad sólo afecta a los productos que ya no son compatibles por el mantenedor. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10237 https://www.dlink.com/en/security-bulletin https://www.nussko.com/advisories/advisory-2021-08-01.txt • CWE-798: Use of Hard-coded Credentials •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the getpage parameter provided to the webproc endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10201 https://www.zerodayinitiative.com/advisories/ZDI-21-976 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the webproc endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10201 https://www.zerodayinitiative.com/advisories/ZDI-21-977 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to OS command injection. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3707, to execute any OS commands on the vulnerable device. El router D-Link DSL-2750U con versiones de firmware vME1.16 o versiones anteriores, es vulnerable a una inyección de comandos del SO. Un atacante no autenticado en la red local puede explotar esto, con CVE-2021-3707, para ejecutar cualquier comando del Sistema Operativo en el dispositivo vulnerable. • https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20%28firmware%20version%201.6%29/README.md https://jvn.jp/en/vu/JVNVU92088210 https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10230 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •