Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-3040_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 24 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-09-23 | CVE-2021-21913 | An information disclosure vulnerability exists in the WiFi Smart Mesh functionality of D-LINK DIR-3040 1.13B03. A specially-crafted network request can lead to command execution. An attacker can connect to the MQTT service to trigger this vulnerability. | Dir\-3040_firmware | 9.8 | ||
2022-04-11 | CVE-2022-1262 | A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root. | Dir\-1360_firmware, Dir\-1760_firmware, Dir\-1960_firmware, Dir\-2640_firmware, Dir\-2660_firmware, Dir\-3040_firmware, Dir\-3060_firmware, Dir\-867_firmware, Dir\-878_firmware, Dir\-882_firmware | 7.8 | ||
2022-12-14 | CVE-2022-44832 | D-Link DIR-3040 device with firmware 120B03 was discovered to contain a command injection vulnerability via the SetTriggerLEDBlink function. | Dir\-3040_firmware | 9.8 | ||
2023-03-29 | CVE-2022-43648 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-3040 1.20B03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MiniDLNA service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the MiniDLNA service. Was... | Dir\-3040_firmware | 8.8 |