Search Results (97 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-60675 2 D-link, Dlink 4 Dir-823g, Dir-823g Firmware, Dir-823g and 1 more 2025-11-17 5.4 Medium
A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.
CVE-2025-60671 2 D-link, Dlink 4 Dir-823g, Dir-823g Firmware, Dir-823g and 1 more 2025-11-17 5.4 Medium
A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /var/system/linux_vlan_reinit file. The vulnerability occurs because content read from this file is only partially validated for a prefix and then formatted using vsnprintf() before being executed with system(), allowing an attacker with write access to /var/system/linux_vlan_reinit to execute arbitrary commands on the device.
CVE-2019-17621 1 Dlink 28 Dir-818lx, Dir-818lx Firmware, Dir-822 and 25 more 2025-11-07 9.8 Critical
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
CVE-2025-60331 1 Dlink 2 Dir-823g, Dir-823g Firmware 2025-10-24 7.5 High
D-Link DIR-823G A1 v1.0.2B05 was discovered to contain a buffer overflow in the FillMacCloneMac parameter in the /EXCU_SHELL endpoint. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2025-60332 2 D-link, Dlink 3 Dir-823g, Dir-823g, Dir-823g Firmware 2025-10-24 7.5 High
A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-823G A1 v1.0.2B05 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
CVE-2025-55848 1 Dlink 3 Dir-823, Dir-823x, Dir-823x Firmware 2025-10-03 8.8 High
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.
CVE-2025-11092 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-10-02 6.3 Medium
A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_switch_settings. This manipulation of the argument port causes command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-11095 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-10-02 6.3 Medium
A vulnerability was detected in D-Link DIR-823X 250416. This vulnerability affects unknown code of the file /goform/delete_offline_device. Performing manipulation of the argument delvalue results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVE-2025-11096 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-10-02 6.3 Medium
A flaw has been found in D-Link DIR-823X 250416. This issue affects some unknown processing of the file /goform/diag_traceroute. Executing manipulation of the argument target_addr can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
CVE-2025-11097 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-10-02 6.3 Medium
A vulnerability has been found in D-Link DIR-823X 250416. Impacted is an unknown function of the file /goform/set_device_name. The manipulation of the argument mac leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-11098 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-10-02 6.3 Medium
A vulnerability was found in D-Link DIR-823X 250416. The affected element is an unknown function of the file /goform/set_wifi_blacklists. The manipulation of the argument macList results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
CVE-2025-11099 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-10-02 6.3 Medium
A vulnerability was determined in D-Link DIR-823X 250416. The impacted element is the function uci_del of the file /goform/delete_prohibiting. This manipulation of the argument delvalue causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-11100 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-10-02 6.3 Medium
A vulnerability was identified in D-Link DIR-823X 250416. This affects the function uci_set of the file /goform/set_wifi_blacklists. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
CVE-2025-10123 2 D-link, Dlink 3 Dir-823, Dir-823x, Dir-823x Firmware 2025-09-24 7.3 High
A vulnerability was determined in D-Link DIR-823X up to 250416. Affected by this vulnerability is the function sub_415028 of the file /goform/set_static_leases. Executing manipulation of the argument Hostname can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-10634 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-09-24 6.3 Medium
A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-10814 2 D-link, Dlink 3 Dir-823x, Dir-823x, Dir-823x Firmware 2025-09-24 6.3 Medium
A vulnerability was determined in D-Link DIR-823X 240126/240802/250416. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/goahead. This manipulation of the argument port causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-10401 2 D-link, Dlink 3 Dir-823, Dir-823x, Dir-823x Firmware 2025-09-24 6.3 Medium
A vulnerability was detected in D-Link DIR-823x up to 250416. The affected element is an unknown function of the file /goform/diag_ping. Performing manipulation of the argument target_addr results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVE-2025-0492 1 Dlink 2 Dir-823x, Dir-823x Firmware 2025-09-24 7.5 High
A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-13030 2 D-link, Dlink 3 Dir-823g, Dir-823g, Dir-823g Firmware 2025-07-15 7.3 High
A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServerSettings of the file /HNAP1/ of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-2359 2 D-link, Dlink 3 Dir-823g, Dir-823g, Dir-823g Firmware 2025-07-15 7.3 High
A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.