Dlink

Dsl-2680 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.57%
  • Veröffentlicht 04.03.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:21

A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to download the configuration (binary file) settings by submitting a rom-0 GET request without being authenticated on the ...

Exploit
  • EPSS 2.12%
  • Veröffentlicht 04.03.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:21

A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to change DNS servers without being authenticated on the admin interface by submitting a crafted Forms/dns_1 POST request.

Exploit
  • EPSS 2.12%
  • Veröffentlicht 04.03.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:34:22

A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to enable or disable MAC address filtering by submitting a crafted Forms/WlanMacFilter_1 POST request without being authen...

Exploit
  • EPSS 0.51%
  • Veröffentlicht 04.03.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:34:21

A Stored XSS issue in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an authenticated attacker to inject arbitrary JavaScript code into the info.html administration page by sending a crafted Forms/wireless_autonetwork_1 PO...

Exploit
  • EPSS 4.08%
  • Veröffentlicht 04.03.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:34:21

A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to reboot the router by submitting a reboot.html GET request without being authenticated on the admin interface.