CVE-2023-33625
https://notcve.org/view.php?id=CVE-2023-33625
D-Link DIR-600 Hardware Version B5, Firmware Version 2.18 was discovered to contain a command injection vulnerability via the ST parameter in the lxmldbc_system() function. • https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/cmd%20injection/README.md https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/cmd%20injection https://hackmd.io/%40naihsin/By2datZD2 https://www.dlink.com/en/security-bulletin https://attackerkb.com/topics/uqicA23ecz/cve-2023-33625 https://github.com/zcutlip/exploit-poc/tree/master/dlink/dir-815-a1/upnp-command-injection https://medium.com/@s1kr10s/d-link-dir-859-unauthenticated-rce-in-ssdpcgi-http-st-cve-2019-2 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-33626
https://notcve.org/view.php?id=CVE-2023-33626
D-Link DIR-600 Hardware Version B5, Firmware Version 2.18 was discovered to contain a stack overflow via the gena.cgi binary. • https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/overflow/README.md https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/overflow https://www.dlink.com/en/security-bulletin • CWE-787: Out-of-bounds Write •
CVE-2019-18852
https://notcve.org/view.php?id=CVE-2019-18852
Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00. Determinados dispositivos D-Link, poseen una cuenta de usuario de Alphanetworks embebida con acceso de TELNET debido a etc/config/image_sign o /etc/alpha_config/image_sign. Esto afecta a DIR-600 B1 versión V2.01 para WW, DIR-890L A1 versión v1.03, DIR-615 J1 versión v100 (para DCN), DIR-645 A1 versión v1.03, DIR-815 A1 versión v1.01, DIR-823 A1 versión v1.01 y DIR-842 C1 versión v3.00. • https://github.com/ChandlerChin/Dlink_vuls/blob/master/A%20hard%20coded%20telnet%20user%20was%20discovered%20in%20multiple%20Dlink%20routers.pdf • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2013-7471
https://notcve.org/view.php?id=CVE-2013-7471
An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request. Se descubrió un problema en soap.cgi? • http://www.s3cur1ty.de/m1adv2013-020 https://www.exploit-db.com/exploits/27044 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2017-12943 – D-Link DIR-600 - Authentication Bypass
https://notcve.org/view.php?id=CVE-2017-12943
D-Link DIR-600 Rev Bx devices with v2.x firmware allow remote attackers to read passwords via a model/__show_info.php?REQUIRE_FILE= absolute path traversal attack, as demonstrated by discovering the admin password. Los dispositivos D-Link DIR-600 Rev Bx con firmware v2.x permiten a los atacantes remotos leer contraseñas mediante un ataque de tipo Absolute Path Traversal model/__show_info.php?REQUIRE_FILE= tal y como se puede ver al descubrir la contraseña de administrador. • https://www.exploit-db.com/exploits/42581 https://github.com/d4rk30/CVE-2017-12943 https://jithindkurup.tumblr.com/post/165218785974/d-link-dir-600-authentication-bypass-absolute https://www.youtube.com/watch?v=PeNOJORAQsQ • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •