Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-X4860_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-09-16 | CVE-2024-45698 | Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device. | Dir\-X4860_firmware | 9.8 | ||
2024-09-16 | CVE-2024-45697 | Certain models of D-Link wireless routers have a hidden functionality where the telnet service is enabled when the WAN port is plugged in. Unauthorized remote attackers can log in and execute OS commands using hard-coded credentials. | Dir\-X4860_firmware | 9.8 | ||
2024-09-16 | CVE-2024-45696 | Certain models of D-Link wireless routers contain hidden functionality. By sending specific packets to the web service, the attacker can forcibly enable the telnet service and log in using hard-coded credentials. The telnet service enabled through this method can only be accessed from within the same local network as the device. | Covr\-X1870_firmware, Dir\-X4860_firmware | 8.8 | ||
2024-09-16 | CVE-2024-45694 | The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device. | Dir\-X4860_firmware, Dir\-X5460_firmware | 9.8 | ||
2024-09-16 | CVE-2024-45695 | The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device. | Dir\-X4860_firmware | 9.8 |