Dlink

Dir-882 Firmware

26 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.62%
  • Published 11.04.2022 20:15:18
  • Last modified 21.11.2024 06:40:21

A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.

  • EPSS 7.87%
  • Published 04.02.2022 02:15:09
  • Last modified 21.11.2024 06:33:27

D-Link device DIR_882 DIR_882_FW1.30B06_Hotfix_02 was discovered to contain a command injection vulnerability in the LocalIPAddress parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.

  • EPSS 8.69%
  • Published 04.02.2022 02:15:07
  • Last modified 21.11.2024 06:31:39

D-Link device DIR_882 DIR_882_FW1.30B06_Hotfix_02 was discovered to contain a command injection vulnerability in the twsystem function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.

  • EPSS 16.65%
  • Published 04.02.2022 02:15:07
  • Last modified 21.11.2024 06:31:39

D-Link devices DIR_878 DIR_878_FW1.30B08_Hotfix_02 and DIR_882 DIR_882_FW1.30B06_Hotfix_02 were discovered to contain a command injection vulnerability in the system function. This vulnerability allows attackers to execute arbitrary commands via a cr...

  • EPSS 1.77%
  • Published 23.03.2020 21:15:12
  • Last modified 21.11.2024 05:39:35

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific ...

  • EPSS 11.33%
  • Published 23.03.2020 21:15:12
  • Last modified 21.11.2024 05:39:35

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific ...