Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Filtered by product Dir-600m
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-13960 1 Dlink 4 Dir-600m, Dir-600m Firmware, Dsl-2730u and 1 more 2023-12-10 5.0 MEDIUM 7.5 HIGH
D-Link DSL 2730-U IN_1.10 and IN_1.11 and DIR-600M 3.04 devices have the domain.name string in the DNS resolver search path by default, which allows remote attackers to provide valid DNS responses (and also offer Internet services such as HTTP) for names that otherwise would have had an NXDOMAIN error, by registering a subdomain of the domain.name domain name.
CVE-2019-13101 1 Dlink 2 Dir-600m, Dir-600m Firmware 2023-12-10 7.5 HIGH 9.8 CRITICAL
An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
CVE-2019-7736 1 Dlink 2 Dir-600m, Dir-600m Firmware 2023-12-10 7.5 HIGH 9.8 CRITICAL
D-Link DIR-600M C1 3.04 devices allow authentication bypass via a direct request to the wan.htm page. NOTE: this may overlap CVE-2019-13101.
CVE-2018-16605 1 Dlink 2 Dir-600m, Dir-600m Firmware 2023-12-10 3.5 LOW 5.4 MEDIUM
D-Link DIR-600M devices allow XSS via the Hostname and Username fields in the Dynamic DNS Configuration page.
CVE-2017-10676 2 D-link, Dlink 2 Dir-600m Firmware, Dir-600m 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
On D-Link DIR-600M devices before C1_v3.05ENB01_beta_20170306, XSS was found in the form2userconfig.cgi username parameter.
CVE-2017-5874 2 D-link, Dlink 2 Dir-600m Firmware, Dir-600m 2023-12-10 6.8 MEDIUM 8.8 HIGH
CSRF exists on D-Link DIR-600M Rev. Cx devices before v3.05ENB01_beta_20170306. This can be used to bypass authentication and insert XSS sequences or possibly have unspecified other impact.
CVE-2017-9100 1 Dlink 2 Dir-600m, Dir-600m Firmware 2023-12-10 8.3 HIGH 8.8 HIGH
login.cgi on D-Link DIR-600M devices with firmware 3.04 allows remote attackers to bypass authentication by entering more than 20 blank spaces in the password field during an admin login attempt.