cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-30063,https://securityvulnerability.io/vulnerability/CVE-2023-30063,Authentication Bypass Vulnerability in D-Link DIR-890L Router,"The D-Link DIR-890L router firmware version 1.10 A1 is susceptible to an authentication bypass vulnerability, which could allow unauthorized users to gain access to the device without valid credentials. This flaw poses significant security risks, potentially enabling attackers to exploit the router’s settings and configurations. Users are advised to review security bulletins from D-Link and consider updating their firmware to safeguard against potential threats.",D-Link,Dir-890l Firmware,7.5,HIGH,0.0030900000128895044,false,false,false,false,,false,false,2023-05-01T00:00:00.000Z,0 CVE-2022-29778,https://securityvulnerability.io/vulnerability/CVE-2022-29778,,D-Link DIR-890L 1.20b01 allows attackers to execute arbitrary code due to the hardcoded option Wake-On-Lan for the parameter 'descriptor' at SetVirtualServerSettings.php,D-Link,Dir-890l Firmware,8.8,HIGH,0.0013699999544769526,false,false,false,true,true,false,false,2022-06-03T20:19:24.000Z,0 CVE-2022-30521,https://securityvulnerability.io/vulnerability/CVE-2022-30521,,The LAN-side Web-Configuration Interface has Stack-based Buffer Overflow vulnerability in the D-Link Wi-Fi router firmware DIR-890L DIR890LA1_FW107b09.bin and previous versions. The function created at 0x17958 of /htdocs/cgibin will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by users easily. The attackers can exploit the vulnerability to carry out arbitrary code by means of sending a specially constructed payload to port 49152.,D-Link,Dir-890l Firmware,9.8,CRITICAL,0.0074800001457333565,false,false,false,false,,false,false,2022-06-02T14:15:00.000Z,0 CVE-2018-12103,https://securityvulnerability.io/vulnerability/CVE-2018-12103,,"An issue was discovered on D-Link DIR-890L with firmware 1.21B02beta01 and earlier, DIR-885L/R with firmware 1.21B03beta01 and earlier, and DIR-895L/R with firmware 1.21B04beta04 and earlier devices (all hardware revisions). Due to the predictability of the /docs/captcha_(number).jpeg URI, being local to the network, but unauthenticated to the administrator's panel, an attacker can disclose the CAPTCHAs used by the access point and can elect to load the CAPTCHA of their choosing, leading to unauthorized login attempts to the access point.",D-Link,Dir-890l Firmware,6.5,MEDIUM,0.0006500000017695129,false,false,false,false,,false,false,2018-07-05T20:00:00.000Z,0