Dlink

Dir-823x Firmware

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 18.09.2025 01:02:15
  • Zuletzt bearbeitet 24.09.2025 18:42:57

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/serve...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 14.09.2025 15:32:06
  • Zuletzt bearbeitet 24.09.2025 18:41:54

A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the atta...

Exploit
  • EPSS 0.48%
  • Veröffentlicht 09.09.2025 02:32:10
  • Zuletzt bearbeitet 24.09.2025 18:43:47

A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack...

Exploit
  • EPSS 1.15%
  • Veröffentlicht 17.04.2025 00:00:00
  • Zuletzt bearbeitet 25.04.2025 18:28:39

An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x41dda8

Exploit
  • EPSS 2.83%
  • Veröffentlicht 17.04.2025 00:00:00
  • Zuletzt bearbeitet 25.04.2025 18:32:43

An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x417234

Exploit
  • EPSS 2.83%
  • Veröffentlicht 17.04.2025 00:00:00
  • Zuletzt bearbeitet 25.04.2025 18:32:08

An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the macaddr key value to the function 0x42232c

Exploit
  • EPSS 2.83%
  • Veröffentlicht 17.04.2025 00:00:00
  • Zuletzt bearbeitet 01.05.2025 18:15:54

An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41710c

Exploit
  • EPSS 2.83%
  • Veröffentlicht 17.04.2025 00:00:00
  • Zuletzt bearbeitet 01.05.2025 18:15:54

An issue in dlink DIR 823x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c

Exploit
  • EPSS 1.64%
  • Veröffentlicht 25.03.2025 00:00:00
  • Zuletzt bearbeitet 03.04.2025 17:35:51

A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remot...

  • EPSS 1.19%
  • Veröffentlicht 24.03.2025 23:31:05
  • Zuletzt bearbeitet 21.05.2025 16:51:45

A vulnerability, which was classified as critical, has been found in D-Link DIR-823X 240126/240802. This issue affects the function sub_41710C of the file /goform/diag_nslookup of the component HTTP POST Request Handler. The manipulation of the argum...