cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-44408,https://securityvulnerability.io/vulnerability/CVE-2024-44408,Information Disclosure in D-Link Router,"The D-Link DIR-823G v1.0.2B05_20181207 is susceptible to an Information Disclosure vulnerability that permits unauthorized access to sensitive configuration files. Attackers can exploit this flaw to download configuration files that contain plaintext user passwords, leading to potential compromise of sensitive accounts and unauthorized access to the network. Securing these devices and applying the necessary updates is critical to mitigate the risk posed by this vulnerability.",D-Link,Dir-823g Firmware,7.5,HIGH,0.0007900000200606883,false,false,false,false,,false,false,2024-09-06T00:00:00.000Z,0 CVE-2023-44835,https://securityvulnerability.io/vulnerability/CVE-2023-44835,Buffer Overflow Vulnerability in D-Link DIR-823G Router,"The D-Link DIR-823G router is susceptible to a buffer overflow vulnerability, specifically through the Mac parameter in the SetParentsControlInfo function. This flaw could be exploited by an attacker sending specially crafted input, potentially leading to a Denial of Service (DoS) condition. Users of the affected model should take immediate action to secure their devices and apply relevant updates available from D-Link.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44833,https://securityvulnerability.io/vulnerability/CVE-2023-44833,Buffer Overflow Vulnerability in D-Link DIR-823G Router,"The D-Link DIR-823G router is susceptible to a buffer overflow via the GuardInt parameter in the SetWLanRadioSettings function. This flaw can be exploited by an attacker to execute a Denial of Service (DoS) attack through specially crafted input, potentially disrupting network services.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44831,https://securityvulnerability.io/vulnerability/CVE-2023-44831,Buffer Overflow Vulnerability in D-Link DIR-823G Router,"The D-Link DIR-823G A1V1.0.2B05 router is susceptible to a buffer overflow vulnerability through the Type parameter in the SetWLanRadioSettings function. By sending specially crafted input, attackers can exploit this weakness, leading to potential Denial of Service (DoS) conditions. This vulnerability emphasizes the importance of securing router firmware and monitoring for suspicious activities to ensure network safety.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44836,https://securityvulnerability.io/vulnerability/CVE-2023-44836,Buffer Overflow Vulnerability in D-Link DIR-823G Router,"The D-Link DIR-823G router is susceptible to a buffer overflow vulnerability triggered by the SSID parameter within the SetWLanRadioSettings function. This flaw can be exploited by attackers to perform a Denial of Service (DoS) attack, rendering the affected device inoperable. Proper safeguards should be implemented to mitigate potential exploitation and ensure network stability.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44834,https://securityvulnerability.io/vulnerability/CVE-2023-44834,Buffer Overflow Vulnerability in D-Link DIR-823G Router,"A buffer overflow vulnerability exists in the D-Link DIR-823G router's SetParentsControlInfo function, specifically through the StartTime parameter. This flaw permits attackers to send specially crafted inputs that lead to a Denial of Service (DoS) condition, potentially disrupting the router's functionality and affecting connected devices.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44829,https://securityvulnerability.io/vulnerability/CVE-2023-44829,Buffer Overflow Vulnerability in D-Link DIR-823G,"The D-Link DIR-823G A1V1.0.2B05 is susceptible to a buffer overflow vulnerability through the AdminPassword parameter in the SetDeviceSettings function. This flaw can be exploited by attackers to manipulate input in such a way that it disrupts service availability, leading to a Denial of Service (DoS) condition. It is essential for users to address this issue to ensure their device's security and continued operation.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44838,https://securityvulnerability.io/vulnerability/CVE-2023-44838,Buffer Overflow in D-Link DIR-823G Router,"The D-Link DIR-823G A1V1.0.2B05 router is vulnerable to a buffer overflow caused by improper handling of the TXPower parameter in the SetWLanRadioSettings function. This vulnerability can be exploited by attackers to send specially crafted input, which may lead to a Denial of Service (DoS) condition, disrupting normal operation of the device. It is crucial for users of the affected router to apply security updates provided by D-Link to mitigate potential risks.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44830,https://securityvulnerability.io/vulnerability/CVE-2023-44830,Buffer Overflow Vulnerability in D-Link DIR-823G Router,"The D-Link DIR-823G A1V1.0.2B05 router is susceptible to a buffer overflow issue through the EndTime parameter in the SetParentsControlInfo function. This vulnerability may be exploited by attackers, leading to a Denial of Service (DoS) condition through specially crafted input, potentially rendering the device inoperable.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44839,https://securityvulnerability.io/vulnerability/CVE-2023-44839,Buffer Overflow Vulnerability in D-Link DIR-823G A1 Wireless Router,"The D-Link DIR-823G A1 wireless router contains a buffer overflow vulnerability that arises from improper handling of the Encryption parameter within the SetWLanRadioSecurity function. This flaw can be exploited by attackers to craft malicious inputs, potentially leading to Denial of Service (DoS) conditions, thereby disrupting the functionality and availability of the affected device.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44832,https://securityvulnerability.io/vulnerability/CVE-2023-44832,Buffer Overflow in D-Link DIR-823G Router,"The D-Link DIR-823G A1V1.0.2B05 router has a vulnerability that enables a buffer overflow through the MacAddress parameter in the SetWanSettings function. This flaw can be exploited by attackers to launch a Denial of Service (DoS) attack, disrupting the normal functioning of the device by sending specially crafted input. Network administrators are advised to review the security bulletin and ensure their devices are updated to mitigate potential risks.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44828,https://securityvulnerability.io/vulnerability/CVE-2023-44828,Buffer Overflow in D-Link Router Products,"A buffer overflow vulnerability was identified in the D-Link DIR-823G router. This security flaw arises specifically in the CheckPasswdSettings function through the CurrentPassword parameter. Attackers can exploit this vulnerability by sending specially crafted input, leading to a Denial of Service (DoS) condition. As a result, legitimate users may experience service interruptions, compromising network availability.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-44837,https://securityvulnerability.io/vulnerability/CVE-2023-44837,Buffer Overflow in D-Link Router Affects DIR-823G Product Line,"The D-Link DIR-823G router contains a buffer overflow vulnerability in the SetWanSettings function, specifically through the Password parameter. This flaw enables attackers to exploit the router's processing of inputs, potentially resulting in a Denial of Service (DoS). By sending a specially crafted input, an attacker can disrupt the normal operation of the device, impacting network reliability and user access.",D-Link,Dir-823g Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-10-05T00:00:00.000Z,0 CVE-2023-43235,https://securityvulnerability.io/vulnerability/CVE-2023-43235,Stack Overflow Vulnerability in D-Link DIR-823G Router,"A stack overflow vulnerability exists in the D-Link DIR-823G router, specifically due to improper handling of parameters StartTime and EndTime in the SetWifiDownSettings function. This flaw could allow an attacker to craft a malicious request, potentially leading to arbitrary code execution or denial of service. Users are advised to review their firmware versions and apply available patches to mitigate the security risk.",D-Link,Dir-823g Firmware,9.8,CRITICAL,0.002259999979287386,false,false,false,false,,false,false,2023-09-21T00:00:00.000Z,0 CVE-2023-43241,https://securityvulnerability.io/vulnerability/CVE-2023-43241,Stack Overflow Vulnerability in D-Link DIR-823G Wireless Router,"A stack overflow vulnerability has been identified in the D-Link DIR-823G wireless router, specifically through the TXPower and GuardInt parameters in the SetWLanRadioSecurity function. This flaw may allow attackers to exploit the buffer overflow, potentially leading to unauthorized access or disruption of service.",D-Link,Dir-823g Firmware,9.8,CRITICAL,0.002259999979287386,false,false,false,false,,false,false,2023-09-21T00:00:00.000Z,0 CVE-2023-26612,https://securityvulnerability.io/vulnerability/CVE-2023-26612,Buffer Overflow Vulnerability in D-Link DIR-823G Firmware,"The D-Link DIR-823G firmware version 1.02B05 contains a buffer overflow vulnerability related to the HostName field in SetParentsControlInfo. This flaw could be exploited by an attacker to execute arbitrary code on the affected device, potentially leading to unauthorized access or disruption of service. Users are advised to apply any available updates and review their security configurations to mitigate this risk.",D-Link,Dir-823g Firmware,9.8,CRITICAL,0.0024500000290572643,false,false,false,false,,false,false,2023-06-29T00:00:00.000Z,0 CVE-2023-26613,https://securityvulnerability.io/vulnerability/CVE-2023-26613,OS Command Injection Vulnerability in D-Link DIR-823G Firmware,"An OS command injection vulnerability exists in the D-Link DIR-823G firmware version 1.02B05. This flaw allows unauthorized attackers to execute arbitrary operating system commands through a specially crafted GET request sent to the EXCU_SHELL interface. Exploiting this vulnerability could lead to unauthorized access and manipulation of the device, potentially compromising network security.",D-Link,Dir-823g Firmware,9.8,CRITICAL,0.0031799999997019768,false,false,false,false,,false,false,2023-06-29T00:00:00.000Z,0 CVE-2023-26616,https://securityvulnerability.io/vulnerability/CVE-2023-26616,Buffer Overflow Vulnerability in D-Link DIR-823G Firmware,"The D-Link DIR-823G firmware version 1.02B05 is susceptible to a buffer overflow vulnerability triggered by improper handling of input data in the SetParentsControlInfo URL field. This oversight could potentially allow an attacker to execute arbitrary code or disrupt normal functions, posing a security risk for users. Timely updates and mitigating measures are essential for safeguarding against exploits targeting this vulnerability.",D-Link,Dir-823g Firmware,9.8,CRITICAL,0.0024500000290572643,false,false,false,false,,false,false,2023-06-29T00:00:00.000Z,0 CVE-2023-26615,https://securityvulnerability.io/vulnerability/CVE-2023-26615,Password Reset Vulnerability in D-Link DIR-823G Firmware,"The D-Link DIR-823G firmware version 1.02B05 contains a security flaw in its SetMultipleActions API, allowing unauthorized users to reset the management password of the device. This vulnerability poses a significant risk as it enables attackers to gain access to the device's web management interface, potentially leading to further exploitation of network settings and connected devices.",D-Link,Dir-823g Firmware,7.5,HIGH,0.0031900000758469105,false,false,false,false,,false,false,2023-06-28T00:00:00.000Z,0 CVE-2023-29665,https://securityvulnerability.io/vulnerability/CVE-2023-29665,Stack Overflow Vulnerability in D-Link DIR823G Router,"The D-Link DIR823G router, version V1.0.2B05, has a security vulnerability that allows for a stack overflow through the NewPassword parameters in the SetPasswdSettings function. This flaw could potentially enable unauthorized access or control over the device, emphasizing the need for users to review their security settings and apply necessary updates promptly.",D-Link,Dir-823g Firmware,9.8,CRITICAL,0.0028899998869746923,false,false,false,false,,false,false,2023-04-17T00:00:00.000Z,0 CVE-2022-44201,https://securityvulnerability.io/vulnerability/CVE-2022-44201,,D-Link DIR823G 1.02B05 is vulnerable to Commad Injection.,D-Link,Dir-823g Firmware,9.8,CRITICAL,0.009460000321269035,false,false,false,false,,false,false,2022-11-22T00:00:00.000Z,0 CVE-2022-44808,https://securityvulnerability.io/vulnerability/CVE-2022-44808,,"A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability.",D-Link,Dir-823g Firmware,9.8,CRITICAL,0.010619999840855598,false,false,false,false,,false,false,2022-11-22T00:00:00.000Z,0 CVE-2022-43109,https://securityvulnerability.io/vulnerability/CVE-2022-43109,,D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.,D-Link,Dir-823g Firmware,9.8,CRITICAL,0.002400000113993883,false,false,false,false,,false,false,2022-11-03T00:00:00.000Z,0 CVE-2021-43474,https://securityvulnerability.io/vulnerability/CVE-2021-43474,,An Access Control vulnerability exists in D-Link DIR-823G REVA1 1.02B05 (Lastest) via any parameter in the HNAP1 function,D-Link,Dir-823g Firmware,9.8,CRITICAL,0.003909999970346689,false,false,false,false,,false,false,2022-04-07T21:02:44.000Z,0 CVE-2020-25368,https://securityvulnerability.io/vulnerability/CVE-2020-25368,,A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the PrivateLogin field to Login.,D-Link,Dir-823g Firmware,9.8,CRITICAL,0.11649999767541885,false,false,false,false,,false,false,2021-11-04T10:19:44.000Z,0