Lucene search

K
DlinkDir-823g Firmware

6 matches found

CVE
CVE
added 2024/02/29 8:15 p.m.80 views

CVE-2024-27657

D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the User-Agent parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution.

8.8CVSS8.4AI score0.01571EPSS
CVE
CVE
added 2024/02/29 8:15 p.m.79 views

CVE-2024-27656

D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Cookie parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution.

8.8CVSS8.4AI score0.01571EPSS
CVE
CVE
added 2024/02/29 8:15 p.m.72 views

CVE-2024-27655

D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the SOAPACTION parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution.

8.8CVSS8.4AI score0.01571EPSS
CVE
CVE
added 2024/11/05 3:15 p.m.49 views

CVE-2024-51024

D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the HostName parameter in the SetWanSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.

8CVSS8.3AI score0.00254EPSS
CVE
CVE
added 2024/11/05 3:15 p.m.45 views

CVE-2024-51023

D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the Address parameter in the SetNetworkTomographySettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.

8.8CVSS8.3AI score0.00292EPSS
CVE
CVE
added 2019/02/05 12:29 a.m.39 views

CVE-2019-7390

An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API.

8.6CVSS8.5AI score0.01024EPSS