5 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 88EXPL: 1

A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/999zzzzz/D-Link https://vuldb.com/?ctiid.251542 https://vuldb.com/?id.251542 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 8EXPL: 1

On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, a reflected Cross-Site Scripting (XSS) attack is possible as a result of missed filtration for special characters in the "Search" field and incorrect processing of the XMLHttpRequest object. En dispositivos D-Link DIR-620 con una determinada variante personalizada (por proveedor de Internet) del firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0 y 2.0.22, es posible un ataque de Cross-Site Scripting (XSS) reflejado como resultado de la falta de filtrado de caracteres especiales en el campo "Search" y el procesamiento erróneo del objeto XMLHttpRequest. • http://www.securitynewspaper.com/2018/05/25/d-link-dir-620-routers-critical-vulnerabilities https://securelist.com/backdoors-in-d-links-backyard/85530 https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 2%CPEs: 8EXPL: 1

On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, OS command injection is possible as a result of incorrect processing of the res_buf parameter to index.cgi. En dispositivos D-Link DIR-620 con una determinada variante personalizada (por proveedor de Internet) del firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0 y 2.0.22, es posible la inyección de comandos del sistema operativo como resultado del procesamiento erróneo del parámetro res_buf en index.cgi. • http://www.securitynewspaper.com/2018/05/25/d-link-dir-620-routers-critical-vulnerabilities https://securelist.com/backdoors-in-d-links-backyard/85530 https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 1

In the web server on D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, there is a hardcoded password of anonymous for the admin account. En el servidor web de los dispositivos D-Link DIR-620 con una determinada variante personalizada (por proveedor de Internet) del firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0 y 2.0.22, hay una contraseña embebida "anonymous" para la cuenta de administrador. • http://www.securitynewspaper.com/2018/05/25/d-link-dir-620-routers-critical-vulnerabilities https://securelist.com/backdoors-in-d-links-backyard/85530 https://securityaffairs.co/wordpress/72839/hacking/d-link-dir-620-flaws.html https://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers • CWE-798: Use of Hard-coded Credentials •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

D-Link DIR-620 devices, with a certain Rostelekom variant of firmware 1.0.37, have a hardcoded rostel account, which makes it easier for remote attackers to obtain access via a TELNET session. Los dispositivos D-Link DIR-620, con cierta variante Rostelekom del firmware 1.0.37, tienen una cuenta rostel embebida, lo que facilita que atacantes remotos obtengan acceso mediante una sesión TELNET. • https://securelist.com/backdoors-in-d-links-backyard/85530 • CWE-798: Use of Hard-coded Credentials •