2 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

D-Link DIR-300 firmware <=REVA1.06 and <=REVB2.06 is vulnerable to File inclusion via /model/__lang_msg.php. • https://gist.github.com/1915504804/9503198d3cbd5bc7db47625ac0caaade https://www.dlink.com/en/security-bulletin •

CVSS: 9.8EPSS: 6%CPEs: 10EXPL: 2

An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request. Se descubrió un problema en soap.cgi? • http://www.s3cur1ty.de/m1adv2013-020 https://www.exploit-db.com/exploits/27044 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •