CVE-2014-125117
- EPSS 57.26%
- Published 25.07.2025 16:15:26
- Last modified 23.09.2025 18:03:59
A stack-based buffer overflow vulnerability in the my_cgi.cgi component of certain D-Link devices, including the DSP-W215 version 1.02, can be exploited via a specially crafted HTTP POST request to the /common/info.cgi endpoint. This flaw enables an ...
CVE-2021-29295
- EPSS 0.44%
- Published 10.08.2021 20:15:08
- Last modified 21.11.2024 06:00:56
Null Pointer Dereference vulnerability exists in D-Link DSP-W215 1.10, which could let a remote malicious user cause a denial of servie via usr/bin/lighttpd. It could be triggered by sending an HTTP request without URL in the start line directly to t...
CVE-2020-13135
- EPSS 0.06%
- Published 18.05.2020 17:15:10
- Last modified 21.11.2024 05:00:43
D-Link DSP-W215 1.26b03 devices allow information disclosure by intercepting messages on the local network, as demonstrated by a Squid Proxy.
CVE-2020-13136
- EPSS 0.24%
- Published 18.05.2020 17:15:10
- Last modified 21.11.2024 05:00:44
D-Link DSP-W215 1.26b03 devices send an obfuscated hash that can be retrieved and understood by a network sniffer.
- EPSS 86.29%
- Published 02.06.2014 14:55:04
- Last modified 12.04.2025 10:46:40
Stack-based buffer overflow in the do_hnap function in www/my_cgi.cgi in D-Link DSP-W215 (Rev. A1) with firmware 1.01b06 and earlier, DIR-505 with firmware before 1.08b10, and DIR-505L with firmware 1.01 and earlier allows remote attackers to execute...