Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-806_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-09-22 | CVE-2023-43129 | D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of REMOTE_PORT parameters. | Dir\-806_firmware | 9.8 | ||
2023-09-22 | CVE-2023-43130 | D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection. | Dir\-806_firmware | 9.8 | ||
2023-09-21 | CVE-2023-43128 | D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of HTTP_ST parameters. | Dir\-806_firmware | 9.8 | ||
2019-09-06 | CVE-2019-10891 | An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header. | Dir\-806_firmware | 9.8 | ||
2019-09-06 | CVE-2019-10892 | An issue was discovered in D-Link DIR-806 devices.There is an stack overflow in fuction hnap_main at /htdocs/cgibin. The function will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by user. And it finally leads to a stack-based buffer overflow via a special HTTP header. | Dir\-806_firmware | 9.8 |