Page 80 of 846 results (0.014 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

A hard-coded password vulnerability exists in the Zebra IP Routing Manager functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of requests to trigger this vulnerability. Se presenta una vulnerabilidad de contraseña embebida en la funcionalidad Zebra IP Routing Manager de D-LINK DIR-3040 versión 1.13B03. Una petición de red especialmente diseñada puede conllevar a una denegación de servicio. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1283 • CWE-259: Use of Hard-coded Password CWE-798: Use of Hard-coded Credentials •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 1

A code execution vulnerability exists in the Libcli Test Environment functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability. Se presenta una vulnerabilidad de ejecución de código en la funcionalidad de Libcli Test Environment de D-LINK DIR-3040 versión 1.13B03. Una petición de red especialmente diseñada puede conllevar a una ejecución de un comando arbitrario. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1284 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

A hard-coded password vulnerability exists in the Libcli Test Environment functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to code execution. An attacker can send a sequence of requests to trigger this vulnerability. Se presenta una vulnerabilidad de contraseña embebida en la funcionalidad Libcli Test Environment de D-LINK DIR-3040 versión 1.13B03. Una petición de red especialmente diseñada puede conllevar a una ejecución de código. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1285 • CWE-798: Use of Hard-coded Credentials •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the SOAPAction HTTP header. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. • https://www.zerodayinitiative.com/advisories/ZDI-21-680 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

There is an arbitrary password modification vulnerability in a D-LINK DSL-2888A router product. An attacker can use this vulnerability to modify the password of the admin user without authorization. Se presenta una vulnerabilidad de modificación arbitraria de la contraseña en un producto router D-LINK DSL-2888A. Un atacante puede utilizar esta vulnerabilidad para modificar la contraseña del usuario administrador sin autorización • https://github.com/EmYiQing/CVE https://www.dlink.com/en/security-bulletin • CWE-306: Missing Authentication for Critical Function •