cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-45698,https://securityvulnerability.io/vulnerability/CVE-2024-45698,Wireless Routers Vulnerable to Command Injection Attacks,"Certain D-Link wireless router models exhibit a significant vulnerability due to inadequate user input validation in their telnet service. This flaw allows unauthenticated attackers to exploit hard-coded credentials, gaining remote access to the devices. Once accessed, attackers can execute arbitrary operating system commands, potentially compromising the entire device and any connected network resources. Prompt attention to this issue is essential for safeguarding network security.",D-link,Dir-x4860 A1,9.8,CRITICAL,0.0008399999933317304,false,false,false,false,,false,false,2024-09-16T06:52:52.517Z,0 CVE-2024-45697,https://securityvulnerability.io/vulnerability/CVE-2024-45697,Unauthorized Remote Access Vulnerability in D-Link Wireless Routers,"Several models of D-Link wireless routers are susceptible to a remote command execution vulnerability due to a hidden feature that enables the telnet service when the WAN port is active. This flaw allows unauthorized remote attackers to gain access and execute operating system commands using hard-coded credentials, compromising the integrity and security of the device and its network. Users of affected D-Link products need to take immediate precautions to secure their networks.",D-link,Dir-x4860 A1,9.8,CRITICAL,0.0008500000112690032,false,false,false,false,,false,false,2024-09-16T06:48:58.070Z,0 CVE-2024-45696,https://securityvulnerability.io/vulnerability/CVE-2024-45696,Hidden Functionality in D-Link Routers Exposes Telnet Service,"Certain models of D-Link wireless routers expose a hidden vulnerability that allows unauthorized access through the telnet service. By sending crafted packets to the router's web service, an attacker can activate the telnet service, which is typically disabled by default. Once enabled, the telnet service permits login using hard-coded credentials, posing a significant risk if an attacker gains access to the local network. This vulnerability underscores the importance of securing administrative interfaces and ensuring that default configurations prevent unauthorized access.",D-link,"Dir-x4860 A1,Covr-x1870",8.8,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-09-16T06:45:52.996Z,0 CVE-2024-45695,https://securityvulnerability.io/vulnerability/CVE-2024-45695,Buffer Overflow Vulnerability Affects D-Link Routers,The web service of specific D-Link wireless router models is susceptible to a Stack-based Buffer Overflow vulnerability. This security flaw enables unauthenticated remote attackers to exploit the weakness to execute arbitrary code on the affected devices. Successful exploitation could lead to unauthorized access and compromise the integrity of the network. Users and administrators are strongly advised to apply security patches and maintain the latest firmware updates to protect against potential attacks targeting this vulnerability.,D-link,Dir-x4860 A1,9.8,CRITICAL,0.0008299999753944576,false,false,false,false,,false,false,2024-09-16T06:37:59.375Z,0 CVE-2024-45694,https://securityvulnerability.io/vulnerability/CVE-2024-45694,Stack-based Buffer Overflow Vulnerability Affects D-Link Wireless Routers,"The web service of certain D-Link wireless router models suffers from a stack-based buffer overflow vulnerability. This issue allows unauthenticated remote attackers to exploit the vulnerability, potentially leading to arbitrary code execution on the affected devices. Given the security implications, users are advised to apply the latest updates provided by D-Link to mitigate the risks associated with this vulnerability.",D-link,"Dir-x5460 A1,Dir-x4860 A1",9.8,CRITICAL,0.0008299999753944576,false,false,false,false,,false,false,2024-09-16T06:33:25.812Z,0