Lucene search

K
DlinkDir-825 Firmware2.10

5 matches found

CVE
CVE
added 2020/03/07 1:15 a.m.163 views

CVE-2020-10213

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

9CVSS9AI score0.04554EPSS
CVE
CVE
added 2020/03/07 1:15 a.m.161 views

CVE-2020-10215

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

9CVSS9AI score0.04109EPSS
CVE
CVE
added 2020/03/07 1:15 a.m.161 views

CVE-2020-10216

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

9CVSS9AI score0.04583EPSS
CVE
CVE
added 2020/03/07 1:15 a.m.156 views

CVE-2020-10214

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. There is a stack-based buffer overflow in the httpd binary. It allows an authenticated user to execute arbitrary code via a POST to ntp_sync.cgi with a sufficiently long parameter ntp_server.

9CVSS8.9AI score0.01998EPSS
CVE
CVE
added 2025/07/09 12:15 a.m.21 views

CVE-2025-7206

A vulnerability, which was classified as critical, has been found in D-Link DIR-825 2.10. This issue affects the function sub_410DDC of the file switch_language.cgi of the component httpd. The manipulation of the argument Language leads to stack-based buffer overflow. The attack may be initiated re...

10CVSS9.7AI score0.001EPSS