6 results (0.056 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. A very long password to /goform/formLogin could lead to a stack-based buffer overflow and overwrite the return address. Se ha descubierto un problema en dispositivos D-Link DIR-816 A2 1.10 B05. Una contraseña muy larga en goform formLogin podría conducir a un desbordamiento de búfer basado en pila y la sobrescritura de la dirección de retorno. • https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/stack_overflow_0 • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 1

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/form2systime.cgi route. This could lead to command injection via shell metacharacters in the datetime parameter. Se ha descubierto un problema en dispositivos D-Link DIR-816 A2 1.10 B05. Se emplea un parámetro de petición HTTP en la construcción de cadenas de comandos en la función handler de la ruta goform form2systime.cgi. • https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_0 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 1

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/NTPSyncWithHost route. This could lead to command injection via shell metacharacters. Se ha descubierto un problema en dispositivos D-Link DIR-816 A2 1.10 B05. Se emplea un parámetro de petición HTTP en la construcción de cadenas de comandos en la función handler de la ruta goform NTPSyncWithHost. • https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_3 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 1

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/Diagnosis route. This could lead to command injection via shell metacharacters in the sendNum parameter. Se ha descubierto un problema en dispositivos D-Link DIR-816 A2 1.10 B05. Se emplea un parámetro de petición HTTP en la construcción de cadenas de comandos en la función handler de la ruta goform Diagnosis. • https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/cmd_injection_1 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/DDNS route, a very long password could lead to a stack-based buffer overflow and overwrite the return address. Se ha descubierto un problema en dispositivos D-Link DIR-816 A2 1.10 B05. En la función handler de la ruta goform DDNS, una contraseña muy larga podría conducir a un desbordamiento de búfer basado en pila y la sobrescritura de la dirección de retorno. • https://github.com/PAGalaxyLab/VulInfo/tree/master/D-Link/DIR-816/stack_overflow_1 • CWE-787: Out-of-bounds Write •