D-link

Dir-600

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.53%
  • Veröffentlicht 05.01.2026 21:14:48
  • Zuletzt bearbeitet 08.01.2026 18:09:23

Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality. By directly requesting this e...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 29.12.2025 15:32:09
  • Zuletzt bearbeitet 13.01.2026 21:11:47

A vulnerability was found in D-Link DIR-600 up to 2.15WWb02. Affected by this vulnerability is an unknown functionality of the file hedwig.cgi of the component HTTP Header Handler. The manipulation of the argument Cookie results in stack-based buffer...

Exploit
  • EPSS 1.64%
  • Veröffentlicht 27.08.2025 21:24:23
  • Zuletzt bearbeitet 24.09.2025 18:03:34

Multiple D-Link DIR-series routers, including DIR-110, DIR-412, DIR-600, DIR-610, DIR-615, DIR-645, and DIR-815 firmware version 1.03, contain a vulnerability in the service.cgi endpoint that allows remote attackers to execute arbitrary system comman...

Exploit
  • EPSS 59.84%
  • Veröffentlicht 01.08.2025 20:39:20
  • Zuletzt bearbeitet 23.09.2025 17:41:57

An OS command injection vulnerability exists in various legacy D-Link routers—including DIR-300 rev B and DIR-600 (firmware ≤ 2.13 and ≤ 2.14b01, respectively)—due to improper input handling in the unauthenticated command.php endpoint. By sending spe...

Exploit
  • EPSS 1.07%
  • Veröffentlicht 01.08.2024 13:15:10
  • Zuletzt bearbeitet 16.07.2025 13:53:45

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-600 up to 2.18. It has been rated as critical. This issue affects the function soapcgi_main of the file /soap.cgi. The manipulation of the argument service leads to os command in...