Product:

Dir\-882_firmware

(Dlink)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 15
Date Id Summary Products Score Patch Annotated
2022-02-04 CVE-2021-44881 D-Link device DIR_882 DIR_882_FW1.30B06_Hotfix_02 was discovered to contain a command injection vulnerability in the twsystem function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request. Dir\-882_firmware 9.8
2022-04-11 CVE-2022-1262 A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root. Dir\-1360_firmware, Dir\-1760_firmware, Dir\-1960_firmware, Dir\-2640_firmware, Dir\-2660_firmware, Dir\-3040_firmware, Dir\-3060_firmware, Dir\-867_firmware, Dir\-878_firmware, Dir\-882_firmware 7.8
2022-02-04 CVE-2021-45998 D-Link device DIR_882 DIR_882_FW1.30B06_Hotfix_02 was discovered to contain a command injection vulnerability in the LocalIPAddress parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request. Dir\-882_firmware 9.8
2020-03-23 CVE-2020-8864 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of empty passwords. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9471. Dir\-867_firmware, Dir\-878_firmware, Dir\-882_firmware 8.8
2020-03-23 CVE-2020-8863 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to escalate privileges and execute code in the context... Dir\-867_firmware, Dir\-878_firmware, Dir\-882_firmware 8.8