cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-25280,https://securityvulnerability.io/vulnerability/CVE-2023-25280,OS Command Injection Vulnerability in D-Link DIR820LA1_FW105B03 Allows Attackers to Escalate Privileges to Root,"An OS Command injection vulnerability exists in D-Link DIR-820L router, where crafted payloads directed at the ping_addr parameter can lead to unauthorized privilege escalation to root. Attackers can exploit this vulnerability by sending specially constructed input to the affected router, which may result in significant security breaches. Users of the DIR-820L should take immediate precautions to mitigate the risks associated with this vulnerability.",D-Link,Dir820la1 Firmware,9.8,CRITICAL,0.04560999944806099,true,2024-09-30T00:00:00.000Z,true,true,true,2024-09-30T00:00:00.000Z,,false,false,,2023-03-16T01:15:00.000Z,0 CVE-2023-25281,https://securityvulnerability.io/vulnerability/CVE-2023-25281,Stack Overflow Vulnerability in D-Link DIR820LA1 Firmware,"A stack overflow vulnerability in the pingV4Msg component of the D-Link DIR820LA1 firmware can be exploited by attackers to induce a denial of service. By manipulating the nextPage parameter within the ping.ccp file, malicious actors could overwhelm the device, disrupting its normal operations and rendering it unresponsive. Users are advised to apply the necessary updates to mitigate possible threats.",D-Link,Dir820la1 Firmware,7.5,HIGH,0.0020200000144541264,false,,false,false,false,,,false,false,,2023-03-16T01:15:00.000Z,0 CVE-2022-34973,https://securityvulnerability.io/vulnerability/CVE-2022-34973,Buffer Overflow Vulnerability in D-Link DIR-820L Router,The D-Link DIR-820L router is susceptible to a buffer overflow vulnerability through the nextPage parameter located in the ping.ccp file. This flaw potentially allows attackers to execute arbitrary code and compromise the device's security. Users are advised to update their firmware to mitigate risks associated with this vulnerability and maintain the integrity of their network.,D-Link,Dir820la1 Firmware,7.5,HIGH,0.001290000043809414,false,,false,false,false,,,false,false,,2022-08-03T14:06:44.000Z,0 CVE-2022-34974,https://securityvulnerability.io/vulnerability/CVE-2022-34974,Command Injection Vulnerability in D-Link DIR810LA1 Router,"An identified command injection vulnerability in the D-Link DIR810LA1_FW102B22 router allows an attacker to exploit the Ping_addr function. This weakness could enable unauthorized command execution, leading to potential unauthorized access or disruption of network services. Users are urged to review their device settings and apply necessary security updates.",D-Link,Dir820la1 Firmware,9.8,CRITICAL,0.0023399998899549246,false,,false,false,false,,,false,false,,2022-08-03T14:06:30.000Z,0