Moxa AWK-3121 version 1.14 devices suffer from authentication bypass, code execution, cross site scripting, and information leakage vulnerabilities.
138332a80edebbd2e6c16300ef7d9715536cc1c8845977bb687fcc2fccfa023d
Linksys E2500 and E1200 devices suffered from a command injection vulnerability.
4809215ff6bf7ac34139ad0ed64e0c279221a469257b12c842d63878327b9050
Parent controls on the Linksys E1200 suffered from having missing authorization controls.
d69510cd73278b8deb8109b50b2d422b2b1d8c1673b2ab98fec4e63eead695a9
D-Link routers, including DIR-815 and DIR-850L, suffer from an SSDP command injection vulnerability.
4e3d45f3b400f3e40793420869eab5c58bd3c39d461bee57c6634b458e7df6e0
D-Link DIR-890L/R suffers from multiple buffer overflow vulnerabilities.
cd1df1d1cdcb3560bfe1fb8e95d212750348f394ef3b8cacab3a1a40a2fda2f3
D-Link DIR-866L suffers from multiple buffer overflow vulnerabilities.
3ef1622faf16aa166e4b8719b10d588766b2d43ed4dc93795867aaf1931ca44e
D-Link DIR-825 suffers from directory traversal and multiple buffer overflow vulnerabilities.
089312d00bd7617a90005a2b391ccd5c79d8b1ba03af87fcce33c25d18a4dec8
D-Link DIR-818W suffers from buffer overflow and command injection vulnerabilities.
792f201b6febeb5bef3e850608ded1e1902fb3c4fecb5c4a97871f704fc50dae
D-Link DIR-817LW suffers from buffer overflow and command injection vulnerabilities.
c271b40e08b71e1680654bf98814d930b7990c5e610021b71b477680b92e0ef8
D-Link DIR-815 suffers from buffer overflow and command injection vulnerabilities.
9e14cf8ca2c86190abc6b7f6945adc96af331a97ca6a82ab9e8e0a093ec992b1
D-Link DIR-645 suffers from a UPNP related buffer overflow vulnerability.
a725188c222995513715c3316a51f4501c5cd39ef45e1ad1f1f79fe105502fe8
D-Link DIR-615 suffers from multiple buffer overflow vulnerabilities.
fc9f8d1f24355c1c5cf793c56630210f961a72482197368a6705a3b904ee102d
D-Link DIR-601 suffers from a remote command injection vulnerability.
6bff534b5c2880dabd13a2439a6fa09119564218ef2843e8bb570c8b0fdfa83e
D-Link DIR-880L suffers from multiple buffer overflow vulnerabilities.
747455371bcce4c79c35c068ab0912a98b4fd795ca97c00e7afdfa5288944be1
D-Link DGL5500 suffers from an HNAP related buffer overflow vulnerability.
4318b5f50ece63ea8d840d9fc299d1f4b18880de6313f2a34bc88149f4e48a23
Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR
fc44a93eba283e1584275d9596c2494164e66d54813e74e0886f302958943e2e
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This Metasploit module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR
e20ef0dd89ff88caf92c753721ba8454b95e56f6cc1668c930745008c71c7246