Dlink

Dir-823g Firmware

52 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Published 17.03.2025 04:00:06
  • Last modified 15.07.2025 16:49:51

A vulnerability classified as critical was found in D-Link DIR-823G 1.0.2B05_20181207. Affected by this vulnerability is the function SetUpnpSettings of the file /HNAP1/ of the component UPnP Service. The manipulation of the argument SOAPAction leads...

Exploit
  • EPSS 0.16%
  • Published 17.03.2025 03:31:06
  • Last modified 15.07.2025 16:52:21

A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper auth...

  • EPSS 0.31%
  • Published 30.12.2024 01:15:06
  • Last modified 15.07.2025 18:37:27

A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServe...

  • EPSS 0.25%
  • Published 05.11.2024 15:15:26
  • Last modified 07.05.2025 14:21:36

D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the HostName parameter in the SetWanSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.

  • EPSS 0.28%
  • Published 05.11.2024 15:15:25
  • Last modified 07.05.2025 14:23:56

D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the Address parameter in the SetNetworkTomographySettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.

Exploit
  • EPSS 0.53%
  • Published 06.09.2024 16:15:03
  • Last modified 10.09.2024 17:01:55

D-Link DIR-823G v1.0.2B05_20181207 is vulnerable to Information Disclosure. The device allows unauthorized configuration file downloads, and the downloaded configuration files contain plaintext user passwords.

Exploit
  • EPSS 0.27%
  • Published 29.04.2024 18:15:07
  • Last modified 21.05.2025 12:54:39

D-Link DIR-823G A1V1.0.2B05 was found to contain a Null-pointer dereference in the main function of upload_firmware.cgi, which allows remote attackers to cause a Denial of Service (DoS) via a crafted input.

Exploit
  • EPSS 2.63%
  • Published 29.02.2024 20:15:41
  • Last modified 21.04.2025 21:58:53

D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the User-Agent parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution.

Exploit
  • EPSS 2.63%
  • Published 29.02.2024 20:15:41
  • Last modified 21.04.2025 21:59:04

D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the SOAPACTION parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution.

Exploit
  • EPSS 2.63%
  • Published 29.02.2024 20:15:41
  • Last modified 21.04.2025 21:58:57

D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Cookie parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution.