The specific flaw exists within the handling of the Cookie HTTP header. Authentication is not required to exploit this vulnerability.
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3708, to execute any OS commands on the vulnerable device. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3707, to execute any OS commands on the vulnerable device.ĭ-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to unauthorized configuration modification. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.ĭ-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to OS command injection. This can lead to command injection through shell metacharacters.Ī buffer overflow in D-Link DIR-615 C2 3.03WW. This can lead to command injection through shell metacharacters.Īn issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.Īn issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. ** UNSUPPORTED WHEN ASSIGNED ** D-Link DVG-3104MS version 1.0.2.0.3, 1.0.2.0.4, and 1.0.2.0.4E contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.ĭ-Link DVX-2000MS contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.
** UNSUPPORTED WHEN ASSIGNED ** D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Authenticated remote attackers can trigger this vulnerability by sending a long string in parameter 'igmpsnoopEnable' via an HTTP request. This vulnerability exists in the web interface "/cgi-bin/New_GUI/Igmp.asp". D-Link DSL-3782 EU v1.01:EU v1.03 is affected by a buffer overflow which can cause a denial of service.