CVE-2025-2621
- EPSS 0.35%
- Veröffentlicht 22.03.2025 16:31:05
- Zuletzt bearbeitet 26.03.2025 18:43:08
A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiate...
- EPSS 33.74%
- Veröffentlicht 22.03.2025 14:31:05
- Zuletzt bearbeitet 26.03.2025 18:44:24
A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based ...
- EPSS 0.35%
- Veröffentlicht 22.03.2025 14:15:16
- Zuletzt bearbeitet 26.03.2025 18:46:06
A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possib...
- EPSS 0.35%
- Veröffentlicht 22.03.2025 13:31:05
- Zuletzt bearbeitet 26.03.2025 18:48:51
A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow....
CVE-2021-46381
- EPSS 90.5%
- Veröffentlicht 04.03.2022 16:15:09
- Zuletzt bearbeitet 21.11.2024 06:34:00
Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].