Dlink

Dsp-w215 Firmware

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 57.26%
  • Published 25.07.2025 16:15:26
  • Last modified 23.09.2025 18:03:59

A stack-based buffer overflow vulnerability in the my_cgi.cgi component of certain D-Link devices, including the DSP-W215 version 1.02, can be exploited via a specially crafted HTTP POST request to the /common/info.cgi endpoint. This flaw enables an ...

  • EPSS 0.44%
  • Published 10.08.2021 20:15:08
  • Last modified 21.11.2024 06:00:56

Null Pointer Dereference vulnerability exists in D-Link DSP-W215 1.10, which could let a remote malicious user cause a denial of servie via usr/bin/lighttpd. It could be triggered by sending an HTTP request without URL in the start line directly to t...

  • EPSS 0.06%
  • Published 18.05.2020 17:15:10
  • Last modified 21.11.2024 05:00:43

D-Link DSP-W215 1.26b03 devices allow information disclosure by intercepting messages on the local network, as demonstrated by a Squid Proxy.

  • EPSS 0.24%
  • Published 18.05.2020 17:15:10
  • Last modified 21.11.2024 05:00:44

D-Link DSP-W215 1.26b03 devices send an obfuscated hash that can be retrieved and understood by a network sniffer.

Exploit
  • EPSS 86.29%
  • Published 02.06.2014 14:55:04
  • Last modified 12.04.2025 10:46:40

Stack-based buffer overflow in the do_hnap function in www/my_cgi.cgi in D-Link DSP-W215 (Rev. A1) with firmware 1.01b06 and earlier, DIR-505 with firmware before 1.08b10, and DIR-505L with firmware 1.01 and earlier allows remote attackers to execute...