Dlink

Dir-825 Firmware

17 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.07%
  • Published 18.09.2025 13:15:33
  • Last modified 19.09.2025 20:16:31

A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is the function sub_4106d4 of the file apply.cgi. The manipulation of the argument countdown_time results in buffer overflow. The attack can be executed ...

Exploit
  • EPSS 0.07%
  • Published 06.09.2025 14:32:05
  • Last modified 29.09.2025 18:29:06

A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to...

Exploit
  • EPSS 0.25%
  • Published 14.08.2025 07:02:09
  • Last modified 18.08.2025 14:53:22

A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer ove...

Exploit
  • EPSS 0.29%
  • Published 08.07.2025 23:32:06
  • Last modified 14.07.2025 14:59:38

A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipulation of the argument Language leads to stack-base...

Exploit
  • EPSS 0.09%
  • Published 20.06.2025 00:31:05
  • Last modified 26.06.2025 17:25:51

A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be ...

Exploit
  • EPSS 0.09%
  • Published 20.06.2025 00:00:22
  • Last modified 26.06.2025 17:00:25

A vulnerability, which was classified as critical, was found in D-Link DIR-825 2.03. This affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the a...

Exploit
  • EPSS 28.39%
  • Published 19.01.2024 16:15:11
  • Last modified 21.11.2024 08:47:12

A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, D...

  • EPSS 0.33%
  • Published 31.01.2023 16:15:09
  • Last modified 27.03.2025 19:15:46

Buffer Overflow Vulnerability in D-Link DIR-825 v1.33.0.44ebdd4-embedded and below allows attacker to execute arbitrary code via the GetConfig method to the /CPE endpoint.

Exploit
  • EPSS 1.22%
  • Published 17.05.2022 14:15:08
  • Last modified 21.11.2024 06:58:55

D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the "../../../../" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the F...

Exploit
  • EPSS 8.69%
  • Published 27.04.2022 11:15:44
  • Last modified 21.11.2024 06:34:05

In the "webupg" binary of D-Link DIR-825 G1, attackers can bypass authentication through parameters "autoupgrade.asp", and perform functions such as downloading configuration files and updating firmware without authorization.