Product:

Dir\-867_firmware

(Dlink)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2023-03-13 CVE-2023-24762 OS Command injection vulnerability in D-Link DIR-867 DIR_867_FW1.30B07 allows attackers to execute arbitrary commands via a crafted LocalIPAddress parameter for the SetVirtualServerSettings to HNAP1. Dir\-867_firmware 9.8
2023-01-26 CVE-2022-41140 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple D-Link routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the lighttpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code... Dir\-867_firmware, Dir\-878_firmware, Dir\-882\-Us_firmware 8.8
2022-04-11 CVE-2022-1262 A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root. Dir\-1360_firmware, Dir\-1760_firmware, Dir\-1960_firmware, Dir\-2640_firmware, Dir\-2660_firmware, Dir\-3040_firmware, Dir\-3060_firmware, Dir\-867_firmware, Dir\-878_firmware, Dir\-882_firmware 7.8
2020-03-23 CVE-2020-8864 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of empty passwords. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9471. Dir\-867_firmware, Dir\-878_firmware, Dir\-882_firmware 8.8
2020-03-23 CVE-2020-8863 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to escalate privileges and execute code in the context... Dir\-867_firmware, Dir\-878_firmware, Dir\-882_firmware 8.8