Dlink

Dir-2640-us Firmware

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.49%
  • Published 30.12.2021 22:15:08
  • Last modified 21.11.2024 05:45:59

Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing ...

Exploit
  • EPSS 1.09%
  • Published 30.12.2021 22:15:08
  • Last modified 21.11.2024 05:45:59

Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by...

Exploit
  • EPSS 0.47%
  • Published 30.12.2021 22:15:07
  • Last modified 21.11.2024 05:45:59

Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on...

Exploit
  • EPSS 0.06%
  • Published 16.06.2021 20:15:07
  • Last modified 21.11.2024 06:10:00

D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the proce...

Exploit
  • EPSS 0.07%
  • Published 16.06.2021 20:15:07
  • Last modified 21.11.2024 06:10:00

D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An...

Exploit
  • EPSS 0.06%
  • Published 16.06.2021 20:15:07
  • Last modified 21.11.2024 06:10:00

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the ...

Exploit
  • EPSS 0.25%
  • Published 16.06.2021 19:15:39
  • Last modified 21.11.2024 06:10:00

There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulne...