Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-823g_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 38 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-09-06 | CVE-2024-44408 | D-Link DIR-823G v1.0.2B05_20181207 is vulnerable to Information Disclosure. The device allows unauthorized configuration file downloads, and the downloaded configuration files contain plaintext user passwords. | Dir\-823g_firmware | 7.5 | ||
2023-10-05 | CVE-2023-44838 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the TXPower parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | Dir\-823g_firmware | 7.5 | ||
2023-10-05 | CVE-2023-44839 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | Dir\-823g_firmware | 7.5 | ||
2023-09-21 | CVE-2023-43235 | D-Link DIR-823G v1.0.2B05 was discovered to contain a stack overflow via parameter StartTime and EndTime in SetWifiDownSettings. | Dir\-823g_firmware | 9.8 | ||
2023-09-21 | CVE-2023-43241 | D-Link DIR-823G v1.0.2B05 was discovered to contain a stack overflow via parameter TXPower and GuardInt in SetWLanRadioSecurity. | Dir\-823g_firmware | 9.8 | ||
2022-11-22 | CVE-2022-44808 | A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability. | Dir\-823g_firmware | 9.8 | ||
2023-06-29 | CVE-2023-26612 | D-Link DIR-823G firmware version 1.02B05 has a buffer overflow vulnerability, which originates from the HostName field in SetParentsControlInfo. | Dir\-823g_firmware | 9.8 | ||
2023-06-29 | CVE-2023-26613 | An OS command injection vulnerability in D-Link DIR-823G firmware version 1.02B05 allows unauthorized attackers to execute arbitrary operating system commands via a crafted GET request to EXCU_SHELL. | Dir\-823g_firmware | 9.8 | ||
2023-06-29 | CVE-2023-26616 | D-Link DIR-823G firmware version 1.02B05 has a buffer overflow vulnerability, which originates from the URL field in SetParentsControlInfo. | Dir\-823g_firmware | 9.8 | ||
2023-06-28 | CVE-2023-26615 | D-Link DIR-823G firmware version 1.02B05 has a password reset vulnerability, which originates from the SetMultipleActions API, allowing unauthorized attackers to reset the WEB page management password. | Dir\-823g_firmware | 7.5 |