Dlink

Dir-859 Firmware

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warning Media report Exploit
  • EPSS 75.93%
  • Published 21.01.2024 08:15:07
  • Last modified 26.06.2025 19:29:56

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulat...

  • EPSS 0.39%
  • Published 31.07.2023 14:15:10
  • Last modified 21.11.2024 08:09:16

Authentication Bypass vulnerability in D-Link DIR-859 FW105b03 allows remote attackers to gain escalated privileges via via phpcgi_main. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Exploit
  • EPSS 0.14%
  • Published 04.03.2022 20:15:07
  • Last modified 21.11.2024 06:51:39

D-Link DIR-859 v1.05 was discovered to contain a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.

  • EPSS 90.33%
  • Published 29.01.2020 03:15:14
  • Last modified 21.11.2024 04:38:13

D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via a urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because HTTP_ST is mishandled. The value of the urn: service/device is checked wi...

  • EPSS 5.13%
  • Published 29.01.2020 03:15:14
  • Last modified 21.11.2024 04:38:13

D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because REMOTE_PORT is mishandled. The value of the urn: service/device is chec...

  • EPSS 5.79%
  • Published 29.01.2020 03:15:14
  • Last modified 21.11.2024 04:38:13

D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checke...

  • EPSS 0.84%
  • Published 02.01.2020 14:16:36
  • Last modified 21.11.2024 04:38:13

D-Link DIR-859 routers before v1.07b03_beta allow Unauthenticated Information Disclosure via the AUTHORIZED_GROUP=1%0a value, as demonstrated by vpnconfig.php.

Warning Exploit
  • EPSS 93.19%
  • Published 30.12.2019 17:15:19
  • Last modified 03.04.2025 20:05:08

The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when co...