4 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

D-Link DIR-615 2.5.17 devices allow Remote Code Execution via shell metacharacters in the Host field of the System / Traceroute screen. Los dispositivos D-Link DIR-615 2.5.17 permite la ejecución remota de código mediante metacaracteres shell en el campo Host de la pantalla System / Traceroute. • https://github.com/imsebao/404team/blob/master/dlink/dlink_dir615_rce.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 3

D-Link DIR-615 T1 devices allow XSS via the Add User feature. Los dispositivos D-Link DIR-615 T1 permiten Cross-Site Scripting (XSS) mediante la característica Add User. The D-Link DIR-615 wireless router suffers from a persistent cross site scripting vulnerability. • https://www.exploit-db.com/exploits/44473 http://packetstormsecurity.com/files/147184/D-Link-DIR-615-Cross-Site-Scripting.html https://hacksayan.wordpress.com/d-link-dir-615-wireless-router-persistent-cross-site-scripting-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device. El Enrutador DIR-615 Wireless N 300 de D-Link, permite la omisión de autenticación por medio de una petición POST modificada para el archivo login.cgi. Este problema ocurre porque no puede comprobar el campo password. • http://www.securityfocus.com/bid/98992 https://twitter.com/tiger_tigerboy/status/873458088321220609 https://www.facebook.com/tigerBOY777/videos/1368513696568992 • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated, as demonstrated by changing the Security option from WPA2 to None, or changing the hiddenSSID parameter, SSID parameter, or a security-option password. D-Link DIR-615 HW: T1 FW:20.09 es vulnerable a la vulnerabilidad Cross-Site Request Forgery (CSRF). Esto permite a un atacante realizar una acción no deseada en un enrutador inalámbrico para el cual el usuario / administrador está actualmente autenticado, como se demuestra cambiando la opción de seguridad de WPA2 a Ninguno o cambiando el parámetro hiddenSSID, el parámetro SSID o una contraseña de opción de seguridad. D-Link DIR-615 suffers from a cross site request forgery vulnerability. • https://www.exploit-db.com/exploits/41821 http://seclists.org/fulldisclosure/2017/Apr/4 • CWE-352: Cross-Site Request Forgery (CSRF) •