cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-1104,https://securityvulnerability.io/vulnerability/CVE-2025-1104,Authentication Bypass Vulnerability in D-Link DHP-W310AV by D-Link,"A vulnerability discovered in the D-Link DHP-W310AV 1.04 model allows attackers to bypass authentication through spoofing techniques. This flaw can be exploited remotely, enabling unauthorized users to gain access to sensitive functionalities without needing valid credentials. The implications of this vulnerability are significant, as attackers can potentially manipulate the device, leading to unauthorized actions that compromise the security of the network. Users of the D-Link DHP-W310AV are urged to apply the necessary security patches and monitor their systems for any suspicious activity.",D-link,DHP-w310av,6.9,MEDIUM,0.0005499999970197678,false,,false,false,true,2025-02-07T16:31:04.000Z,true,false,false,,2025-02-07T16:31:04.664Z,0 CVE-2022-44930,https://securityvulnerability.io/vulnerability/CVE-2022-44930,Command Injection Vulnerability in D-Link DHP-W310AV Product,"The D-Link DHP-W310AV device is susceptible to a command injection vulnerability through its System Checks function. This security flaw could allow unauthorized users to execute arbitrary commands on the affected device, potentially compromising system integrity and enabling further malicious activity. It is crucial for users and system administrators to remain vigilant and apply necessary updates to mitigate this risk.",D-Link,DHP-w310av Firmware,9.8,CRITICAL,0.008390000090003014,false,,false,false,false,,,false,false,,2022-12-02T00:00:00.000Z,0