CVE-2024-0717 – D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure
https://notcve.org/view.php?id=CVE-2024-0717
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/999zzzzz/D-Link https://vuldb.com/?ctiid.251542 https://vuldb.com/?id.251542 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2021-46353
https://notcve.org/view.php?id=CVE-2021-46353
An information disclosure in web interface in D-Link DIR-X1860 before 1.03 RevA1 allows a remote unauthenticated attacker to send a specially crafted HTTP request and gain knowledge of different absolute paths that are being used by the web application. Una revelación de información en la interfaz web en D-Link DIR-X1860 versiones anteriores a 1.03 RevA1, permite a un atacante remoto no autenticado enviar una petición HTTP especialmente diseñada y conseguir conocimiento de las diferentes rutas absolutas que están siendo usadas por la aplicación web • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10283 https://www.dlink.com/en/security-bulletin • CWE-209: Generation of Error Message Containing Sensitive Information •
CVE-2021-41445
https://notcve.org/view.php?id=CVE-2021-41445
A reflected cross-site-scripting attack in web application of D-Link DIR-X1860 before v1.10WWB09_Beta allows a remote unauthenticated attacker to execute code in the device of the victim via sending a specific URL to the unauthenticated victim. Un ataque de tipo cross-site-scripting reflejado en la aplicación web de D-Link DIR-X1860 versiones anteriores a v1.10WB09_Beta, permite a un atacante remoto no autenticado ejecutar código en el dispositivo de la víctima por medio del envío de una URL específica a la víctima no autenticada • http://d-link.com http://dir-x1860.com https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10283 https://www.dlink.com/en/security-bulletin • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-41442
https://notcve.org/view.php?id=CVE-2021-41442
An HTTP smuggling attack in the web application of D-Link DIR-X1860 before v1.10WWB09_Beta allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet. Un ataque de contrabando HTTP en la aplicación web de D-Link DIR-X1860 versiones anteriores a v1.10WB09_Beta, permite a un atacante remoto no autenticado hacer DoS a la aplicación web por medio del envío de un paquete HTTP específico • http://d-link.com http://dir-x1860.com https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10283 https://www.dlink.com/en/security-bulletin • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •
CVE-2021-41441
https://notcve.org/view.php?id=CVE-2021-41441
A DoS attack in the web application of D-Link DIR-X1860 before v1.10WWB09_Beta allows a remote unauthenticated attacker to reboot the router via sending a specially crafted URL to an authenticated victim. The authenticated victim need to visit this URL, for the router to reboot. Un ataque de DoS en la aplicación web de D-Link DIR-X1860 versiones anteriores a v1.10WB09_Beta, permite a un atacante remoto no autenticado reiniciar el router por medio del envío de una URL especialmente diseñada a una víctima autenticada. La víctima autenticada debe visitar esta URL para que el router sea reiniciado • http://d-link.com http://dir-x1860.com https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10283 https://www.dlink.com/en/security-bulletin • CWE-404: Improper Resource Shutdown or Release •