Dlink

Dsl-2640b Firmware

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.76%
  • Published 20.04.2020 23:15:12
  • Last modified 21.11.2024 05:40:20

An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. A cfm UDP service listening on port 65002 allows remote, unauthenticated exfiltration of administrative credentials.

Exploit
  • EPSS 0.84%
  • Published 20.04.2020 23:15:12
  • Last modified 21.11.2024 05:40:20

An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. The function do_cgi(), which processes cgi requests supplied to the device's web servers, is vulnerable to a remotely exploitable stack-based buffer overflow. Unauthenticated exploitati...

Exploit
  • EPSS 0.66%
  • Published 20.04.2020 23:15:12
  • Last modified 21.11.2024 05:40:20

An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. Authentication can be bypassed when accessing cgi modules. This allows one to perform administrative tasks (e.g., modify the admin password) with no authentication.

Exploit
  • EPSS 0.64%
  • Published 20.04.2020 23:15:12
  • Last modified 21.11.2024 05:40:20

An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. The device can be reset to its default configuration by accessing an unauthenticated URL.

Exploit
  • EPSS 2.22%
  • Published 20.04.2020 23:15:12
  • Last modified 21.11.2024 05:40:20

An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. A hard-coded account allows management-interface login with high privileges. The logged-in user can perform critical tasks and take full control of the device.

Exploit
  • EPSS 7.1%
  • Published 08.10.2012 18:55:01
  • Last modified 11.04.2025 00:51:21

Cross-site request forgery (CSRF) vulnerability in redpass.cgi in D-Link DSL-2640B Firmware EU_4.00 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via the sysPassword paramet...