D-link

Dir-605l

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Veröffentlicht 06.02.2026 14:02:09
  • Zuletzt bearbeitet 17.02.2026 19:08:56

A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The impacted element is an unknown function of the file /wan_connection_status.asp of the component DHCP Connection Status Handler. The manipulation leads to ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 06.02.2026 13:15:54
  • Zuletzt bearbeitet 17.02.2026 19:09:14

A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element is an unknown function of the component DHCP Client Information Handler. Executing a manipulation can lead to information disclosure. The attack may ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 06.02.2026 12:32:08
  • Zuletzt bearbeitet 17.02.2026 19:09:28

A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. Impacted is an unknown function of the component Wifi Setting Handler. Performing a manipulation results in information disclosure. The attack may be initiated remot...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 08.01.2026 00:00:00
  • Zuletzt bearbeitet 30.01.2026 01:07:50

An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interfac...

Exploit
  • EPSS 55.32%
  • Veröffentlicht 31.07.2025 14:54:19
  • Zuletzt bearbeitet 23.09.2025 17:45:55

A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data...

  • EPSS 0.38%
  • Veröffentlicht 23.05.2025 00:00:00
  • Zuletzt bearbeitet 03.06.2025 15:47:26

Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis.

  • EPSS 0.96%
  • Veröffentlicht 09.05.2025 00:00:15
  • Zuletzt bearbeitet 13.05.2025 20:23:04

A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01. Affected is the function wake_on_lan. The manipulation of the argument mac leads to command injection. It is possible to launch the attack remotely. The vendor was cont...

  • EPSS 1.74%
  • Veröffentlicht 08.05.2025 23:31:26
  • Zuletzt bearbeitet 13.05.2025 20:23:09

A vulnerability was found in D-Link DIR-605L 2.13B01. It has been rated as critical. This issue affects the function sub_454F2C. The manipulation of the argument sysCmd leads to command injection. The attack may be initiated remotely. The vendor was ...

  • EPSS 0.94%
  • Veröffentlicht 08.05.2025 23:31:14
  • Zuletzt bearbeitet 13.05.2025 20:23:14

A vulnerability was found in D-Link DIR-605L 2.13B01. It has been declared as critical. This vulnerability affects the function formSetWAN_Wizard55. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remote...

  • EPSS 0.94%
  • Veröffentlicht 08.05.2025 23:00:18
  • Zuletzt bearbeitet 13.05.2025 20:23:21

A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formSetWAN_Wizard534. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotel...