Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dir\-619l_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 58 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-05-09 | CVE-2025-4450 | A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.04B04. Affected is the function formSetEasy_Wizard. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-619l_firmware | 9.8 | ||
2025-05-09 | CVE-2025-4451 | A vulnerability has been found in D-Link DIR-619L 2.04B04 and classified as critical. Affected by this vulnerability is the function formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-619l_firmware | 9.8 | ||
2025-05-09 | CVE-2025-4452 | A vulnerability was found in D-Link DIR-619L 2.04B04 and classified as critical. Affected by this issue is the function formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-619l_firmware | 9.8 | ||
2025-05-09 | CVE-2025-4453 | A vulnerability was found in D-Link DIR-619L 2.04B04. It has been classified as critical. This affects the function formSysCmd. The manipulation of the argument sysCmd leads to command injection. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-619l_firmware | 9.8 | ||
2025-05-09 | CVE-2025-4454 | A vulnerability was found in D-Link DIR-619L 2.04B04. It has been declared as critical. This vulnerability affects the function wake_on_lan. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | Dir\-619l_firmware | 9.8 | ||
2015-05-01 | CVE-2014-8361 | The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. | W1200ex\-Ms_firmware, W1200ex_firmware, W300p_firmware, W500p_firmware, Wf300hp2_firmware, Wf800hp_firmware, Wg1200hp2_firmware, Wg1200hp3_firmware, Wg1200hp_firmware, Wg1200hs2_firmware, Wg1200hs_firmware, Wg1800hp3_firmware, Wg1800hp4_firmware, Wg1900hp2_firmware, Wg1900hp_firmware, Wr8165n_firmware, Dir\-501_firmware, Dir\-515_firmware, Dir\-600l_firmware, Dir\-605l_firmware, Dir\-615_firmware, Dir\-619l_firmware, Dir\-809_firmware, Dir\-905l_firmware, Realtek_sdk | 9.8 | ||
2023-07-17 | CVE-2023-37791 | D-Link DIR-619L v2.04(TW) was discovered to contain a stack overflow via the curTime parameter at /goform/formLogin. | Dir\-619l_firmware | 9.8 | ||
2023-09-11 | CVE-2020-19319 | Buffer overflow vulnerability in DLINK 619L version B 2.06beta via the FILECODE parameter on login. | Dir\-619l_firmware | 9.8 | ||
2023-09-11 | CVE-2020-19320 | Buffer overflow vulnerability in DLINK 619L version B 2.06beta via the curTime parameter on login. | Dir\-619l_firmware | 9.8 | ||
2023-09-11 | CVE-2020-19323 | An issue was discovered in /bin/mini_upnpd on D-Link DIR-619L 2.06beta devices. There is a heap buffer overflow allowing remote attackers to restart router via the M-search request ST parameter. No authentication required | Dir\-619l_firmware | 7.5 |