- EPSS 21.27%
- Published 31.01.2019 22:29:00
- Last modified 21.11.2024 04:47:57
An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetwor...
CVE-2018-17881
- EPSS 1.37%
- Published 03.10.2018 20:29:17
- Last modified 21.11.2024 03:55:07
On D-Link DIR-823G 2018-09-19 devices, the GoAhead configuration allows /HNAP1 SetPasswdSettings commands without authentication to trigger an admin password change.
CVE-2018-17880
- EPSS 1.29%
- Published 03.10.2018 20:29:16
- Last modified 21.11.2024 03:55:07
On D-Link DIR-823G 2018-09-19 devices, the GoAhead configuration allows /HNAP1 RunReboot commands without authentication to trigger a reboot.
CVE-2018-17786
- EPSS 14.23%
- Published 02.10.2018 18:29:02
- Last modified 21.11.2024 03:54:58
On D-Link DIR-823G devices, ExportSettings.sh, upload_settings.cgi, GetDownLoadSyslog.sh, and upload_firmware.cgi do not require authentication, which allows remote attackers to execute arbitrary code.
CVE-2018-17787
- EPSS 23.2%
- Published 02.10.2018 18:29:02
- Last modified 21.11.2024 03:54:58
On D-Link DIR-823G devices, the GoAhead configuration allows /HNAP1 Command Injection via shell metacharacters in the POST data, because this data is sent directly to the "system" library function.