Dlink

Dir-809 Firmware

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.98%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:34

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80046eb4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request.

Exploit
  • EPSS 2.55%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:34

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualApp. This vulnerability is triggered via a crafted POST request.

Exploit
  • EPSS 1.87%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:37

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request.

Exploit
  • EPSS 1.87%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:37

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_8003183C in /fromLogin. This vulnerability is triggered via a crafted POST request.

Exploit
  • EPSS 1.87%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:37

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualServ. This vulnerability is triggered via a crafted POST request.

Exploit
  • EPSS 1.87%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:37

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_800462c4 in /formAdvFirewall. This vulnerability is triggered via a crafted POST request.

Exploit
  • EPSS 1.87%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:38

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_80046EB4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request.

Exploit
  • EPSS 1.87%
  • Veröffentlicht 01.12.2021 22:15:07
  • Zuletzt bearbeitet 21.11.2024 06:08:38

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80040af8 in /formWlanSetup. This vulnerability is triggered via a crafted POST request.

Warnung
  • EPSS 94.03%
  • Veröffentlicht 01.05.2015 15:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.