Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
5.3
CVE-2024-0717
- EPSS 28.39%
- Published 19.01.2024 16:15:11
- Last modified 21.11.2024 08:47:12
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, D...
9.8
CVE-2023-32224
- EPSS 0.91%
- Published 28.06.2023 21:15:10
- Last modified 21.11.2024 08:02:56
D-Link DSL-224 firmware version 3.0.10 CWE-307: Improper Restriction of Excessive Authentication Attempts
8.8
CVE-2023-32223
- EPSS 0.13%
- Published 28.06.2023 21:15:09
- Last modified 27.11.2024 17:15:05
D-Link DSL-224 firmware version 3.0.10 allows post authentication command execution via an unspecified method.
9.9
CVE-2022-36786
- EPSS 0.1%
- Published 17.11.2022 23:15:17
- Last modified 29.04.2025 20:15:20
DLINK - DSL-224 Post-auth RCE. DLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API. It is possible to inject a command through this interface that will run with ROOT permissions on t...
1