![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-0717 – D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure
https://notcve.org/view.php?id=CVE-2024-0717
19 Jan 2024 — A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, D... • https://github.com/999zzzzz/D-Link • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-47035
https://notcve.org/view.php?id=CVE-2022-47035
31 Jan 2023 — Buffer Overflow Vulnerability in D-Link DIR-825 v1.33.0.44ebdd4-embedded and below allows attacker to execute arbitrary code via the GetConfig method to the /CPE endpoint. La vulnerabilidad de desbordamiento de búfer en D-Link DIR-825 v1.33.0.44ebdd4-embedded y versiones anteriores permite a un atacante ejecutar código arbitrario a través del método GetConfig en el endpoint /CPE. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10314 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-29332
https://notcve.org/view.php?id=CVE-2022-29332
17 May 2022 — D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the "../../../../" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the FTP server. D-LINK DIR-825 AC1200 R2 es vulnerable a un Salto de Directorio. Un atacante podría usar la configuración "../../../../" de la carpeta del servidor FTP para establecer la carpeta root del router para el acceso FTP. • https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-29296
https://notcve.org/view.php?id=CVE-2021-29296
10 Aug 2021 — Null Pointer Dereference vulnerability in D-Link DIR-825 2.10b02, which could let a remote malicious user cause a denial of service. The vulnerability could be triggered by sending an HTTP request with URL /vct_wan; the sbin/httpd would invoke the strchr function and take NULL as a first argument, which finally leads to the segmentation fault. NOTE: The DIR-825 and all hardware revisions is considered End of Life and as such this issue will not be patched Vulnerabilidad de Desreferencia de Puntero Null en D... • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10212 • CWE-476: NULL Pointer Dereference •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-10214
https://notcve.org/view.php?id=CVE-2020-10214
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. There is a stack-based buffer overflow in the httpd binary. It allows an authenticated user to execute arbitrary code via a POST to ntp_sync.cgi with a sufficiently long parameter ntp_server. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Se presenta un desbordamiento de búfer en la región stack de la memoria en el binario httpd. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability4.md • CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-10215
https://notcve.org/view.php?id=CVE-2020-10215
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Permiten a atacantes remotos ejecutar comandos arbitrarios por medio del parámetro dns_query_name en una petición POST del archivo dns_query.cgi. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability2.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-10216
https://notcve.org/view.php?id=CVE-2020-10216
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Permiten a atacantes remotos ejecutar comandos arbitrarios por medio del parámetro date en una petición POST del archivo system_time.cgi. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability1.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-10213
https://notcve.org/view.php?id=CVE-2020-10213
07 Mar 2020 — An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected. Se detectó un problema en los dispositivos D-Link DIR-825 Rev.B versión 2.10. Permiten a atacantes remotos ejecutar comandos arbitrarios por medio del parámetro wps_sta_enrollee_pin en una petición POST del archivo set_sta_enrollee_pin.cgi. • https://github.com/kuc001/IoTFirmware/blob/master/D-Link/vulnerability3.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •