Lucene search

K
DlinkDir-825 Firmware

10 matches found

CVE
CVE
added 2020/03/07 1:15 a.m.165 views

CVE-2020-10213

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

9CVSS9AI score0.04554EPSS
CVE
CVE
added 2020/03/07 1:15 a.m.162 views

CVE-2020-10215

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

9CVSS9AI score0.04109EPSS
CVE
CVE
added 2020/03/07 1:15 a.m.162 views

CVE-2020-10216

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

9CVSS9AI score0.04583EPSS
CVE
CVE
added 2020/03/07 1:15 a.m.158 views

CVE-2020-10214

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. There is a stack-based buffer overflow in the httpd binary. It allows an authenticated user to execute arbitrary code via a POST to ntp_sync.cgi with a sufficiently long parameter ntp_server.

9CVSS8.9AI score0.01998EPSS
CVE
CVE
added 2022/04/27 11:15 a.m.80 views

CVE-2021-46441

In the "webupg" binary of D-Link DIR-825 G1, because of the lack of parameter verification, attackers can use "cmd" parameters to execute arbitrary system commands after obtaining authorization.

9CVSS9.6AI score0.22967EPSS
CVE
CVE
added 2022/04/27 11:15 a.m.73 views

CVE-2021-46442

In the "webupg" binary of D-Link DIR-825 G1, attackers can bypass authentication through parameters "autoupgrade.asp", and perform functions such as downloading configuration files and updating firmware without authorization.

9.8CVSS9.7AI score0.08692EPSS
In wild
CVE
CVE
added 2023/01/31 4:15 p.m.46 views

CVE-2022-47035

Buffer Overflow Vulnerability in D-Link DIR-825 v1.33.0.44ebdd4-embedded and below allows attacker to execute arbitrary code via the GetConfig method to the /CPE endpoint.

9.8CVSS9.7AI score0.00325EPSS
CVE
CVE
added 2025/06/20 1:15 a.m.10 views

CVE-2025-6292

A vulnerability has been found in D-Link DIR-825 2.03 and classified as critical. This vulnerability affects the function sub_4091AC of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclose...

9CVSS8.9AI score0.00091EPSS
CVE
CVE
added 2025/06/20 1:15 a.m.9 views

CVE-2025-6291

A vulnerability, which was classified as critical, was found in D-Link DIR-825 2.03. This affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to...

9CVSS8.9AI score0.00091EPSS
CVE
CVE
added 2025/08/14 7:15 a.m.7 views

CVE-2025-8949

A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer overflow. The attack can be launched remotely. The e...

9.8CVSS7.2AI score0.00089EPSS