Dlink

Dir-868l Firmware

18 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.82%
  • Published 28.08.2025 00:00:00
  • Last modified 09.09.2025 18:41:54

D-Link DIR-868L B1 router firmware version FW2.05WWB02 contains an unauthenticated OS command injection vulnerability in the fileaccess.cgi component. The endpoint /dws/api/UploadFile accepts a pre_api_arg parameter that is passed directly to system-...

  • EPSS 0.26%
  • Published 18.08.2023 03:15:22
  • Last modified 21.11.2024 08:15:47

D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the inet_ntoa() function.

  • EPSS 0.26%
  • Published 18.08.2023 03:15:22
  • Last modified 21.11.2024 08:15:47

D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the FUN_0000acb4 function.

  • EPSS 0.26%
  • Published 18.08.2023 03:15:21
  • Last modified 21.11.2024 08:15:47

D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the acStack_50 parameter.

  • EPSS 0.27%
  • Published 02.05.2023 15:15:23
  • Last modified 21.11.2024 07:57:35

D-Link DIR-868L Hardware version A1, firmware version 1.12 is vulnerable to Buffer Overflow. The vulnerability is in scandir.sgi binary.

Exploit
  • EPSS 1.03%
  • Published 04.06.2021 20:15:07
  • Last modified 21.11.2024 05:23:54

The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.

  • EPSS 0.84%
  • Published 02.01.2020 14:16:36
  • Last modified 21.11.2024 04:38:13

D-Link DIR-859 routers before v1.07b03_beta allow Unauthenticated Information Disclosure via the AUTHORIZED_GROUP=1%0a value, as demonstrated by vpnconfig.php.

Warning Exploit
  • EPSS 93.19%
  • Published 30.12.2019 17:15:19
  • Last modified 03.04.2025 20:05:08

The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when co...

Exploit
  • EPSS 4.78%
  • Published 14.10.2019 18:15:10
  • Last modified 21.11.2024 03:13:49

Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L 1.08B04 and DIR-895 L/R 1.13b03. The impact is: execute arbitrary code (remote). The component is: htdocs/fileaccess.cgi. The attack vector is: A crafted HTTP request han...

Exploit
  • EPSS 0.9%
  • Published 09.09.2019 20:15:10
  • Last modified 21.11.2024 04:30:14

SharePort Web Access on D-Link DIR-868L REVB through 2.03, DIR-885L REVA through 1.20, and DIR-895L REVA through 1.21 devices allows Authentication Bypass, as demonstrated by a direct request to folder_view.php or category_view.php.