Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-605l_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 44 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-05-23 | CVE-2025-46176 | Hardcoded credentials in the Telnet service in D-Link DIR-605L v2.13B01 and DIR-816L v2.06B01 allow attackers to remotely execute arbitrary commands via firmware analysis. | Dir\-605l_firmware, Dir\-816l_firmware | N/A | ||
2024-06-13 | CVE-2024-37630 | D-Link DIR-605L v2.13B01 was discovered to contain a hardcoded password vulnerability in /etc/passwd, which allows attackers to log in as root. | Dir\-605l_firmware | N/A | ||
2025-05-08 | CVE-2025-4441 | A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formSetWAN_Wizard534. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-605l_firmware | 9.8 | ||
2025-05-09 | CVE-2025-4442 | A vulnerability was found in D-Link DIR-605L 2.13B01. It has been declared as critical. This vulnerability affects the function formSetWAN_Wizard55. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-605l_firmware | 9.8 | ||
2025-05-09 | CVE-2025-4443 | A vulnerability was found in D-Link DIR-605L 2.13B01. It has been rated as critical. This issue affects the function sub_454F2C. The manipulation of the argument sysCmd leads to command injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-605l_firmware | 9.8 | ||
2025-05-09 | CVE-2025-4445 | A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01. Affected is the function wake_on_lan. The manipulation of the argument mac leads to command injection. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-605l_firmware | 9.8 | ||
2021-09-24 | CVE-2021-40655 | An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page | Dir\-605l_firmware | 7.5 | ||
2015-05-01 | CVE-2014-8361 | The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. | W1200ex\-Ms_firmware, W1200ex_firmware, W300p_firmware, W500p_firmware, Wf300hp2_firmware, Wf800hp_firmware, Wg1200hp2_firmware, Wg1200hp3_firmware, Wg1200hp_firmware, Wg1200hs2_firmware, Wg1200hs_firmware, Wg1800hp3_firmware, Wg1800hp4_firmware, Wg1900hp2_firmware, Wg1900hp_firmware, Wr8165n_firmware, Dir\-501_firmware, Dir\-515_firmware, Dir\-600l_firmware, Dir\-605l_firmware, Dir\-615_firmware, Dir\-619l_firmware, Dir\-809_firmware, Dir\-905l_firmware, Realtek_sdk | 9.8 | ||
2023-05-16 | CVE-2023-29961 | D-Link DIR-605L firmware version 1.17B01 BETA is vulnerable to stack overflow via /goform/formTcpipSetup, | Dir\-605l_firmware | 9.8 | ||
2024-11-28 | CVE-2024-11959 | A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | Dir\-605l_firmware | 8.8 |