Product:

Dir\-615_firmware

(Dlink)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 12
Date Id Summary Products Score Patch Annotated
2015-05-01 CVE-2014-8361 The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. W1200ex\-Ms_firmware, W1200ex_firmware, W300p_firmware, W500p_firmware, Wf300hp2_firmware, Wf800hp_firmware, Wg1200hp2_firmware, Wg1200hp3_firmware, Wg1200hp_firmware, Wg1200hs2_firmware, Wg1200hs_firmware, Wg1800hp3_firmware, Wg1800hp4_firmware, Wg1900hp2_firmware, Wg1900hp_firmware, Wr8165n_firmware, Dir\-501_firmware, Dir\-515_firmware, Dir\-600l_firmware, Dir\-605l_firmware, Dir\-615_firmware, Dir\-619l_firmware, Dir\-809_firmware, Dir\-905l_firmware, Realtek_sdk 9.8
2021-08-06 CVE-2021-37388 A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution. Dir\-615_firmware 9.8