Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Dsp\-W215_firmware
(Dlink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-05-18 | CVE-2020-13135 | D-Link DSP-W215 1.26b03 devices allow information disclosure by intercepting messages on the local network, as demonstrated by a Squid Proxy. | Dsp\-W215_firmware | 6.5 | ||
2020-05-18 | CVE-2020-13136 | D-Link DSP-W215 1.26b03 devices send an obfuscated hash that can be retrieved and understood by a network sniffer. | Dsp\-W215_firmware | 7.5 | ||
2021-08-10 | CVE-2021-29295 | Null Pointer Dereference vulnerability exists in D-Link DSP-W215 1.10, which could let a remote malicious user cause a denial of servie via usr/bin/lighttpd. It could be triggered by sending an HTTP request without URL in the start line directly to the device. NOTE: The DSP-W215 and all hardware revisions is considered End of Life and as such this issue will not be patched | Dsp\-W215_firmware | 7.5 | ||
2014-06-02 | CVE-2014-3936 | Stack-based buffer overflow in the do_hnap function in www/my_cgi.cgi in D-Link DSP-W215 (Rev. A1) with firmware 1.01b06 and earlier, DIR-505 with firmware before 1.08b10, and DIR-505L with firmware 1.01 and earlier allows remote attackers to execute arbitrary code via a long Content-Length header in a GetDeviceSettings action in an HNAP request. | Dir505_shareport_mobile_companion, Dir505_shareport_mobile_companion_firmware, Dir505l_shareport_mobile_companion_firmware, Dir\-505l_shareport_mobile_companion, Dsp\-W215, Dsp\-W215_firmware | N/A |