D-link Dir Luki w zabezpieczeniach

Oś czasu

Ostatni rok

Wersja

1.0.2B0524
1.10 B0516
FW114WWb07_h2ab_beta115
1.10CNB0413
1.0512

Przeciwdziałanie

Official Fix132
Temporary Fix0
Workaround34
Unavailable9
Not Defined416

Wykorzystywanie

High14
Functional0
Proof-of-Concept64
Unproven2
Not Defined511

Wektor dostępu

Not Defined0
Physical1
Local7
Adjacent273
Network310

Uwierzytelnianie

Not Defined0
High32
Low276
None283

Interakcja z użytkownikiem

Not Defined0
Required45
None546

C3BM Index

Ostatni rok

CVSSv3 Base

≤10
≤20
≤34
≤44
≤520
≤6116
≤7135
≤8186
≤9106
≤1020

CVSSv3 Temp

≤10
≤20
≤35
≤46
≤533
≤6120
≤7133
≤8176
≤9102
≤1016

VulDB

≤10
≤20
≤36
≤413
≤545
≤6224
≤7120
≤8135
≤930
≤1018

NVD

≤10
≤20
≤30
≤40
≤52
≤66
≤723
≤871
≤968
≤10170

CNA

≤10
≤20
≤30
≤40
≤51
≤62
≤71
≤81
≤93
≤100

Sprzedawca

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤101

Exploit 0-day

<1k0
<2k0
<5k16
<10k261
<25k299
<50k14
<100k1
≥100k0

Wykorzystaj dzisiaj

<1k112
<2k19
<5k107
<10k242
<25k110
<50k1
<100k0
≥100k0

Wykorzystaj wielkość rynku

Ostatni rok

🔴 CTI Zajęcia

Affected Versions (300): 1.0, 1.0.2, 1.0.2B05, 1.0.3, 1.0.37, 1.00, 1.00A52, 1.00b05, 1.01, 1.01B04, 1.01KRb03, 1.01SSb08.bin, 1.01b06, 1.02, 1.02-2.06, 1.02B03, 1.02B05, 1.02B10, 1.02b18, 1.02na, 1.03, 1.03 A1, 1.03B04, 1.03B08, 1.03b08, 1.04, 1.04b12, 1.05, 1.05B03, 1.06, 1.06B01, 1.06B01 Beta01, 1.06B01_Beta01, 1.07, 1.2, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.11, 1.2.12, 1.2.13, 1.2.14, 1.2.15, 1.2.16, 1.2.17, 1.2.18, 1.2.19, 1.2.21, 1.2.22, 1.2.23, 1.2.24, 1.2.25, 1.2.26, 1.2.27, 1.2.28, 1.2.29, 1.2.31, 1.2.32, 1.2.33, 1.2.34, 1.2.35, 1.2.36, 1.2.37, 1.2.38, 1.2.39, 1.2.41, 1.2.42, 1.2.43, 1.2.44, 1.2.45, 1.2.46, 1.2.47, 1.2.48, 1.2.49, 1.2.51, 1.2.52, 1.2.53, 1.2.54, 1.2.55, 1.2.56, 1.2.57, 1.2.58, 1.2.59, 1.2.61, 1.2.62, 1.2.63, 1.2.64, 1.2.65, 1.2.66, 1.2.67, 1.2.68, 1.2.69, 1.2.71, 1.2.72, 1.2.73, 1.2.74, 1.2.75, 1.2.76, 1.2.77, 1.2.78, 1.2.79, 1.2.81, 1.2.82, 1.2.83, 1.2.84, 1.2.85, 1.2.86, 1.2.87, 1.2.88, 1.2.89, 1.2.91, 1.2.92, 1.2.93, 1.2.94, 1.3.1, 1.3.3, 1.3.7, 1.4, 1.10, 1.10 A1, 1.10 B05, 1.10B02, 1.10B04, 1.10B05, 1.10CNB0, 1.10CNB04, 1.10CNB05, 1.10CNB05_R1B011D88210, 1.11, 1.11B02, 1.11b04 HF1, 1.12, 1.12A1, 1.12B01, 1.12WWB03_20190410, 1.12b, 1.13B03, 1.14, 1.14B07, 1.15b02, 1.17B01 Beta, 1.17beta, 1.20B01 Beta, 1.20B03, 1.20B06, 1.20B10_BETA, 1.20b01, 1.20b03a, 1.21WW, 1.21b05, 1.30, 1.30B06_Hotfix_02, 1.30B07, 1.30B08, 1.30B08_Hotfix_02, 1.33.0.44ebdd4-embedded, 2.0, 2.0.22, 2.00NA, 2.01MT, 2.01b02, 2.01mt, 2.02, 2.02NA, 2.03, 2.04, 2.05.B03, 2.05B02, 2.06, 2.06B01 BETA, 2.06beta, 2.06betab01, 2.07, 2.07.B01, 2.07.B05, 2.08, 2.5.17, 2.10, 2.10KR, 2.10b02, 2.11na, 2.13, 2.13B01, 2.14b01, 2.16ww, 2.18, 2.34EU, 3, 3.0.1, 3.0.2, 3.01, 3.02, 3.02B05 BETA02, 3.03, 3.03WW, 3.04, 3.06, 3.08, 3.10B06, 3.13B05, 3.13B09 HOTFIX, 5.10, 8.0, 8.1, 8.2, 8.3, 8.4, 8.5, 8.6, 8.7, 8.8, 8.9, 8.10, 20.0, 20.05, 20.06, 20.07, 20.09, 20.1, 20.2, 20.3, 20.4, 20.5, 20.6, 20.7, 20.8, 20.9, 20.10, 20.11, 20.12, 100.26, 100A35, 100A43, 100A53DBR-Retail, 100A53DLA, 100CNb11, 102B15, 105A1, 105b01, 107b09, 120B03, 130B06, 150, 202KRb06, 206b01, 250, 500, 1000, 2018-09-19, 20240112, A1, A1 1.02NA, A1-1.14WW, A1_100.26, A1_FW107WWb08, A2_v1.10CNB04, A_1-12_eu_multi_20170316, B1_FW223WWb01, Bx, FW1.0, FW1.1, FW1.2, FW1.3, FW1.4, FW1.5, FW1.6, FW1.7, FW1.8, FW1.9, FW1.10, FW1.11, FW1.12, FW1.13, FW1.14, FW1.15, FW1.16, FW1.17, FW100A43, FW100A53DBR, FW102b01, FW102b07, FW105b01, FW105b03, FW114WWb07_h2ab_beta1, FW130B06, FW208WWb02, Firmware 1.02, Firmware 1.03b08, Frimware 1.03b08, REVA1.06, REVB2.06, Rev.B 2.1, V1.0.2B05, fw_revA_1-02_eu_multi_20151008

Link to Product Website: https://www.dlink.com/

Typ oprogramowania: Router Operating System

OpublikowanoBaseTempSłaby punkt0dayDzisiajWykPrzCTICVE
2024-03-297.37.3D-Link DIR-3040us A1 FTP Server memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.08CVE-2024-27619
2024-03-225.55.3D-Link DIR-845L privilege escalation$5k-$25k$5k-$25kNot DefinedNot Defined0.05CVE-2024-29366
2024-03-227.37.1D-Link DIR-845L soapcgi_main weak authentication$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2024-29385
2024-03-129.89.8D-Link DIR-822 Rev B/DIR-822-CA Rev B HNAP memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2024-25331
2024-02-295.75.7D-Link DIR-823G sub_42AF30 denial of service$5k-$25k$0-$5kNot DefinedNot Defined0.02CVE-2024-27659
2024-02-295.75.7D-Link DIR-823G sub_4484A8 denial of service$5k-$25k$5k-$25kNot DefinedNot Defined0.02CVE-2024-27658
2024-02-296.36.3D-Link DIR-823G memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2024-27657
2024-02-296.36.3D-Link DIR-823G memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2024-27656
2024-02-296.36.3D-Link DIR-823G memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.07CVE-2024-27655
2024-02-295.75.7D-Link DIR-823G sub_4110f4 denial of service$5k-$25k$0-$5kNot DefinedNot Defined0.02CVE-2024-27662
2024-02-295.75.7D-Link DIR-823G sub_4484A8 denial of service$5k-$25k$0-$5kNot DefinedNot Defined0.02CVE-2024-27661
2024-02-295.75.7D-Link DIR-823G sub_41C488 denial of service$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2024-27660
2024-02-227.57.0D-Link DIR-600M C1 Telnet Service memory corruption$5k-$25k$0-$5kProof-of-ConceptWorkaround0.04CVE-2024-1786
2024-02-215.55.3D-Link DIR-882 POST Request privilege escalation$5k-$25k$5k-$25kNot DefinedNot Defined0.02CVE-2023-24330
2024-02-215.55.3D-Link DIR-816 privilege escalation$5k-$25k$5k-$25kNot DefinedNot Defined0.03CVE-2023-24331
2024-02-088.08.0D-Link DIR-816A2 sub_42DA54 privilege escalation$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2024-24321
2024-01-266.46.3D-Link DIR-816 A2 Web Interface setDeviceSettings privilege escalation$5k-$25k$0-$5kProof-of-ConceptNot Defined0.00CVE-2024-0921
2024-01-257.67.5D-Link DIR-882 sub_477AA0 memory corruption$5k-$25k$5k-$25kNot DefinedNot Defined0.02CVE-2024-22751
2024-01-247.67.5D-Link DIR-815 ssdpcgi_main privilege escalation$5k-$25k$5k-$25kNot DefinedNot Defined0.02CVE-2024-22651
2024-01-207.67.5D-Link DIR-859 HTTP POST Request hedwig.cgi directory traversal$5k-$25k$0-$5kProof-of-ConceptNot Defined0.35CVE-2024-0769
2024-01-195.35.0D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure$5k-$25k$0-$5kProof-of-ConceptNot Defined0.39CVE-2024-0717
2024-01-126.86.5D-Link DIR-X3260 prog.cgi SetDynamicDNSSettings memory corruption$5k-$25k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-51613
2024-01-126.86.5D-Link DIR-X3260 prog.cgi SetQuickVPNSettings memory corruption$5k-$25k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-51614
2024-01-126.86.5D-Link DIR-X3260 prog.cgi SetWanSettings memory corruption$5k-$25k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-51617
2024-01-126.86.5D-Link DIR-X3260 prog.cgi SetQuickVPNSettings memory corruption$5k-$25k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-51615

566 więcej wpisów nie jest pokazywanych

więcej wpisów autorstwa D-link

Do you know our Splunk app?

Download it now for free!