Vulnerabilities (CVE)

Filtered by vendor Dlink Subscribe
Filtered by product Dir-820l
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-44809 1 Dlink 2 Dir-820l, Dir-820l Firmware 2023-12-10 N/A 9.8 CRITICAL
D-Link device DIR-820L 1.05B03 is vulnerable to Insecure Permissions.
CVE-2023-44807 1 Dlink 2 Dir-820l, Dir-820l Firmware 2023-12-10 N/A 9.8 CRITICAL
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the cancelPing function.
CVE-2023-44808 1 Dlink 2 Dir-820l, Dir-820l Firmware 2023-12-10 N/A 9.8 CRITICAL
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_4507CC function.
CVE-2023-25283 1 Dlink 2 Dir-820l, Dir-820l Firmware 2023-12-10 N/A 7.5 HIGH
A stack overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the reserveDHCP_HostName_1.1.1.0 parameter to lan.asp.
CVE-2023-25282 1 Dlink 2 Dir-820l, Dir-820l Firmware 2023-12-10 N/A 6.5 MEDIUM
A heap overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the config.log_to_syslog and log_opt_dropPackets parameters to mydlink_api.ccp.
CVE-2023-25279 1 Dlink 2 Dir-820l, Dir-820l Firmware 2023-12-10 N/A 9.8 CRITICAL
OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload.
CVE-2021-45382 1 Dlink 12 Dir-810l, Dir-810l Firmware, Dir-820l and 9 more 2023-12-10 10.0 HIGH 9.8 CRITICAL
A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.
CVE-2022-26258 1 Dlink 2 Dir-820l, Dir-820l Firmware 2023-12-10 7.5 HIGH 9.8 CRITICAL
D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.
CVE-2015-1187 2 Dlink, Trendnet 30 Dir-626l, Dir-626l Firmware, Dir-636l and 27 more 2023-12-10 10.0 HIGH 9.8 CRITICAL
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.