cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-30063,https://securityvulnerability.io/vulnerability/CVE-2023-30063,Authentication Bypass Vulnerability in D-Link DIR-890L Router,"The D-Link DIR-890L router firmware version 1.10 A1 is susceptible to an authentication bypass vulnerability, which could allow unauthorized users to gain access to the device without valid credentials. This flaw poses significant security risks, potentially enabling attackers to exploit the router’s settings and configurations. Users are advised to review security bulletins from D-Link and consider updating their firmware to safeguard against potential threats.",D-Link,Dir-890l Firmware,7.5,HIGH,0.0030900000128895044,false,,false,false,false,,,false,false,,2023-05-01T00:00:00.000Z,0 CVE-2022-29778,https://securityvulnerability.io/vulnerability/CVE-2022-29778,Arbitrary Code Execution Vulnerability in D-Link DIR-890L Router,"The D-Link DIR-890L router, version 1.20b01, has a vulnerability that allows remote attackers to execute arbitrary code via the hardcoded 'Wake-On-Lan' option in the 'descriptor' parameter during SetVirtualServerSettings.php operations. This flaw can potentially compromise the integrity of the device, allowing unauthorized access and manipulation of sensitive data.",D-Link,Dir-890l Firmware,8.8,HIGH,0.0013699999544769526,false,,false,false,true,2022-03-31T11:45:20.000Z,true,false,false,,2022-06-03T20:19:24.000Z,0 CVE-2022-30521,https://securityvulnerability.io/vulnerability/CVE-2022-30521,Stack-based Buffer Overflow in D-Link DIR-890L Wi-Fi Router Firmware,"The D-Link DIR-890L Wi-Fi router contains a stack-based buffer overflow vulnerability in its LAN-side Web Configuration Interface. This flaw arises from the firmware's failure to validate the length of strings received through HTTP headers in the sprintf function. Attackers can easily manipulate this vulnerability by sending specially crafted payloads to port 49152, enabling them to execute arbitrary code remotely. Users of the DIR-890L should ensure they update to the latest firmware version to mitigate potential security risks.",D-Link,Dir-890l Firmware,9.8,CRITICAL,0.008249999955296516,false,,false,false,false,,,false,false,,2022-06-02T14:15:00.000Z,0 CVE-2018-12103,https://securityvulnerability.io/vulnerability/CVE-2018-12103,,"An issue was discovered on D-Link DIR-890L with firmware 1.21B02beta01 and earlier, DIR-885L/R with firmware 1.21B03beta01 and earlier, and DIR-895L/R with firmware 1.21B04beta04 and earlier devices (all hardware revisions). Due to the predictability of the /docs/captcha_(number).jpeg URI, being local to the network, but unauthenticated to the administrator's panel, an attacker can disclose the CAPTCHAs used by the access point and can elect to load the CAPTCHA of their choosing, leading to unauthorized login attempts to the access point.",D-Link,Dir-890l Firmware,6.5,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2018-07-05T20:00:00.000Z,0