Filtered by vendor Dlink Subscriptions
Total 1074 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2019-17621 1 Dlink 28 Dir-818lx, Dir-818lx Firmware, Dir-822 and 25 more 2025-02-04 9.8 Critical
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
CVE-2019-16057 1 Dlink 2 Dns-320, Dns-320 Firmware 2025-02-04 9.8 Critical
The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.
CVE-2018-6530 1 Dlink 8 Dir-860l, Dir-860l Firmware, Dir-865l and 5 more 2025-02-04 9.8 Critical
OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.
CVE-2019-16920 1 Dlink 20 Dap-1533, Dap-1533 Firmware, Dhp-1565 and 17 more 2025-02-04 9.8 Critical
Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.
CVE-2016-11021 1 Dlink 2 Dcs-930l, Dcs-930l Firmware 2025-02-04 7.2 High
setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.
CVE-2021-40655 1 Dlink 2 Dir-605l, Dir-605l Firmware 2025-02-04 7.5 High
An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page
CVE-2015-2051 1 Dlink 2 Dir-645, Dir-645 Firmware 2025-02-04 8.8 High
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
CVE-2020-9377 1 Dlink 2 Dir-610, Dir-610 Firmware 2025-02-03 8.8 High
D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2016-20017 1 Dlink 2 Dsl-2750b, Dsl-2750b Firmware 2025-02-03 9.8 Critical
D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
CVE-2023-30063 1 Dlink 2 Dir-890l, Dir-890l Firmware 2025-01-30 7.5 High
D-Link DIR-890L FW1.10 A1 is vulnerable to Authentication bypass.
CVE-2023-30061 1 Dlink 2 Dir-879, Dir-879 Firmware 2025-01-30 7.5 High
D-Link DIR-879 v105A1 is vulnerable to Authentication Bypass via phpcgi.
CVE-2021-45382 1 Dlink 12 Dir-810l, Dir-810l Firmware, Dir-820l and 9 more 2025-01-29 9.8 Critical
A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.
CVE-2022-26258 1 Dlink 2 Dir-820l, Dir-820l Firmware 2025-01-29 9.8 Critical
D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.
CVE-2023-29961 1 Dlink 2 Dir-605l, Dir-605l Firmware 2025-01-23 9.8 Critical
D-Link DIR-605L firmware version 1.17B01 BETA is vulnerable to stack overflow via /goform/formTcpipSetup,
CVE-2023-31814 1 Dlink 2 Dir-300, Dir-300 Firmware 2025-01-17 9.8 Critical
D-Link DIR-300 firmware <=REVA1.06 and <=REVB2.06 is vulnerable to File inclusion via /model/__lang_msg.php.
CVE-2023-33735 1 Dlink 2 Dir-846, Dir-846 Firmware 2025-01-10 9.8 Critical
D-Link DIR-846 v1.00A52 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in the /HNAP1 interface.
CVE-2022-37056 1 Dlink 2 Go-rt-ac750, Go-rt-ac750 Firmware 2025-01-09 9.8 Critical
D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main,
CVE-2019-10891 1 Dlink 2 Dir-806, Dir-806 Firmware 2025-01-09 9.8 Critical
An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header.
CVE-2023-33781 1 Dlink 2 Dir-842v2, Dir-842v2 Firmware 2025-01-07 8.8 High
An issue in D-Link DIR-842V2 v1.0.3 allows attackers to execute arbitrary commands via importing a crafted file.
CVE-2023-33782 1 Dlink 2 Dir-842v2, Dir-842v2 Firmware 2025-01-06 8.8 High
D-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerability via the iperf3 diagnostics function.