4 results (0.007 seconds)

CVSS: 7.5EPSS: 36%CPEs: 7EXPL: 1

Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router allows remote attackers to execute arbitrary code via a long M-SEARCH request to UDP port 1900. Desbordamiento de búfer basado en pila en el servicio Universal Plug and Play (UPnP) de D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router permite a atacantes remotos ejecutar código de su elección mediante una petición M-SEARCH larga al puerto UDP 1900. • https://www.exploit-db.com/exploits/28230 http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0363.html http://secunia.com/advisories/21081 http://securitytracker.com/id?1016511 http://www.eeye.com/html/research/advisories/AD20060714.html http://www.kb.cert.org/vuls/id/971705 http://www.osvdb.org/27333 http://www.securityfocus.com/archive/1/440298/100/0/threaded http://www.securityfocus.com/archive/1/440852/100/100/threaded http://www.securityfocus.com/bid/19 •

CVSS: 5.0EPSS: 12%CPEs: 4EXPL: 3

D-Link DI-524 Wireless Router, DI-624 Wireless Router, and DI-784 allow remote attackers to cause a denial of service (device reboot) via a series of crafted fragmented UDP packets, possibly involving a missing fragment. • https://www.exploit-db.com/exploits/1496 http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0188.html http://secunia.com/advisories/18833 http://www.securityfocus.com/bid/16621 http://www.thunkers.net/~deft/advisories/dlink_udp_dos.txt http://www.vupen.com/english/advisories/2006/0563 https://exchange.xforce.ibmcloud.com/vulnerabilities/24631 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

Integer signedness error in D-Link AirPlus DI-614+ running firmware 2.30 and earlier allows remote attackers to cause a denial of service (IP lease depletion) via a DHCP request with the LEASETIME option set to -1, which makes the DHCP lease valid for thirteen or more years. • http://marc.info/?l=bugtraq&m=108844250013785&w=2 http://secunia.com/advisories/12018 http://www.osvdb.org/7294 http://www.securityfocus.com/archive/1/367485 http://www.securityfocus.com/bid/10621 https://exchange.xforce.ibmcloud.com/vulnerabilities/16531 •

CVSS: 5.1EPSS: 1%CPEs: 3EXPL: 1

Cross-site scripting (XSS) vulnerability in D-Link DI-614+ SOHO router running firmware 2.30, and DI-704 SOHO router running firmware 2.60B2, and DI-624, allows remote attackers to inject arbitrary script or HTML via the DHCP HOSTNAME option in a DHCP request. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en D-Link DI-614+ SOHO router corriendo firmware 2.30 y DI-704 SOHO Router corriendo firmware 2.60B2 permite a atacantes remotos inyectar script arbitrario o HTML mediante la opción DHCP HOSTNAME en una petición DHCP. • https://www.exploit-db.com/exploits/24226 http://archives.neohapsis.com/archives/bugtraq/2004-07/0014.html http://marc.info/?l=bugtraq&m=108786257609932&w=2 http://marc.info/?l=bugtraq&m=108797273127182&w=2 http://secunia.com/advisories/11919 http://securitytracker.com/id?1010562 http://www.osvdb.org/7211 http://www.securityfocus.com/bid/10587 https://exchange.xforce.ibmcloud.com/vulnerabilities/16468 •