mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d4f28bd9d8
commit
a3f5a4c4e7
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/addRouting."
|
||||
"value": "D-link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img is vulnerable to Buffer Overflow via /goform/addRouting."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting",
|
||||
"url": "https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In D-Link DIR-816 A2_v1.10CNB04.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability"
|
||||
"value": "In D-Link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/Diagnosis/readme.md",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/Diagnosis/readme.md"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/Diagnosis",
|
||||
"url": "https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/Diagnosis"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWan2Settings module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Password parameter in the SetWan2Settings module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,21 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/rkXr4BQPi",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/rkXr4BQPi"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWan2Settings_pppoe",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWan2Settings_pppoe"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWan2Settings_pptp",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWan2Settings_pptp"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWan2Settings_l2tp",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWan2Settings_l2tp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWanSettings module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Password parameter in the SetWanSettings module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,21 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/ry55QVQvj",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/ry55QVQvj"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWanSettings_PPPoE",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWanSettings_PPPoE"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWanSettings_L2TP",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWanSettings_L2TP"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWanSettings_PPTP",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWanSettings_PPTP"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the PSK parameter in the SetQuickVPNSettings module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the PSK parameter in the SetQuickVPNSettings module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/B1C9jeXDi",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/B1C9jeXDi"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetQuickVPNSettings_PSK",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetQuickVPNSettings_PSK"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetDynamicDNSSettings module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Password parameter in the SetDynamicDNSSettings module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/HkDzZLCUo",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/HkDzZLCUo"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetDynamicDNSSettings",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetDynamicDNSSettings"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetQuickVPNSettings module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Password parameter in the SetQuickVPNSettings module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/SyhDme7wo",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SyhDme7wo"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetQuickVPNSettings_Password",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetQuickVPNSettings_Password"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the AccountPassword parameter in the SetSysEmailSettings module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the AccountPassword parameter in the SetSysEmailSettings module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/B1SZP0aIo",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/B1SZP0aIo"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetSysEmailSettings",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetSysEmailSettings"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Key parameter in the SetWLanRadioSecurity module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Key parameter in the SetWLanRadioSecurity module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,11 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/r1R6sWRUs",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/r1R6sWRUs"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWLanRadioSecurity",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWLanRadioSecurity"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWan3Settings module."
|
||||
"value": "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Password parameter in the SetWan3Settings module."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,21 @@
|
||||
"url": "https://hackmd.io/@0dayResearch/r1zsTSmDs",
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/r1zsTSmDs"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWan3Settings_l2tp",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWan3Settings_l2tp"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWan3Settings_pppoe",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWan3Settings_pppoe"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackmd.io/@0dayResearch/SetWan3Settings_pptp",
|
||||
"url": "https://hackmd.io/@0dayResearch/SetWan3Settings_pptp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user