Product:

Dir\-X4860_firmware

(Dlink)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2024-09-16 CVE-2024-45698 Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device. Dir\-X4860_firmware 9.8
2024-09-16 CVE-2024-45697 Certain models of D-Link wireless routers have a hidden functionality where the telnet service is enabled when the WAN port is plugged in. Unauthorized remote attackers can log in and execute OS commands using hard-coded credentials. Dir\-X4860_firmware 9.8
2024-09-16 CVE-2024-45696 Certain models of D-Link wireless routers contain hidden functionality. By sending specific packets to the web service, the attacker can forcibly enable the telnet service and log in using hard-coded credentials. The telnet service enabled through this method can only be accessed from within the same local network as the device. Covr\-X1870_firmware, Dir\-X4860_firmware 8.8
2024-09-16 CVE-2024-45694 The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device. Dir\-X4860_firmware, Dir\-X5460_firmware 9.8
2024-09-16 CVE-2024-45695 The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device. Dir\-X4860_firmware 9.8