Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-505l_shareport_mobile_companion
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-05-12 | CVE-2013-4772 | D-Link DIR-505L SharePort Mobile Companion 1.01 and DIR-826L Wireless N600 Cloud Router 1.02 allows remote attackers to bypass authentication via a direct request when an authorized session is active. | Dir\-505l_shareport_mobile_companion, Dir\-505l_shareport_mobile_companion_firmware, Dir\-826l_wireless_n600_cloud_router, Dir\-826l_wireless_n600_cloud_router_firmware | N/A | ||
2014-06-02 | CVE-2014-3936 | Stack-based buffer overflow in the do_hnap function in www/my_cgi.cgi in D-Link DSP-W215 (Rev. A1) with firmware 1.01b06 and earlier, DIR-505 with firmware before 1.08b10, and DIR-505L with firmware 1.01 and earlier allows remote attackers to execute arbitrary code via a long Content-Length header in a GetDeviceSettings action in an HNAP request. | Dir505_shareport_mobile_companion, Dir505_shareport_mobile_companion_firmware, Dir505l_shareport_mobile_companion_firmware, Dir\-505l_shareport_mobile_companion, Dsp\-W215, Dsp\-W215_firmware | N/A |