cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-24581,https://securityvulnerability.io/vulnerability/CVE-2020-24581,,An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It contains an execute_cmd.cgi feature (that is not reachable via the web user interface) that lets an authenticated user execute Operating System commands.,D-Link,Dsl2888a Firmware,8,HIGH,0.002959999954327941,false,false,false,false,,false,false,2020-12-22T18:05:02.000Z,0 CVE-2020-24580,https://securityvulnerability.io/vulnerability/CVE-2020-24580,,An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. Lack of authentication functionality allows an attacker to assign a static IP address that was once used by a valid user.,D-Link,Dsl2888a Firmware,7.5,HIGH,0.0007300000288523734,false,false,false,false,,false,false,2020-12-22T18:04:56.000Z,0 CVE-2020-24579,https://securityvulnerability.io/vulnerability/CVE-2020-24579,,An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality.,D-Link,Dsl2888a Firmware,8.8,HIGH,0.033560000360012054,false,false,false,false,,false,false,2020-12-22T18:04:52.000Z,0 CVE-2020-24578,https://securityvulnerability.io/vulnerability/CVE-2020-24578,,An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It has a misconfigured FTP service that allows a malicious network user to access system folders and download sensitive files (such as the password hash file).,D-Link,Dsl2888a Firmware,6.5,MEDIUM,0.0007300000288523734,false,false,false,false,,false,false,2020-12-22T18:04:24.000Z,0