cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-26567,https://securityvulnerability.io/vulnerability/CVE-2020-26567,,"An issue was discovered on D-Link DSR-250N before 3.17B devices. The CGI script upgradeStatusReboot.cgi can be accessed without authentication. Any access reboots the device, rendering it therefore unusable for several minutes.",D-Link,Dsr-250n Firmware,5.5,MEDIUM,0.08229000121355057,false,false,false,false,,false,false,2020-10-08T12:22:15.000Z,0 CVE-2012-6614,https://securityvulnerability.io/vulnerability/CVE-2012-6614,,"D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain ""persistent root access"" via the BusyBox CLI, as demonstrated by overwriting the super user password.",D-Link,Dsr-250n Firmware,7.2,HIGH,0.005929999984800816,false,false,false,false,,false,false,2020-02-19T14:17:39.000Z,0 CVE-2012-6613,https://securityvulnerability.io/vulnerability/CVE-2012-6613,,D-Link DSR-250N devices with firmware 1.05B73_WW allow Persistent Root Access because of the admin password for the admin account.,D-Link,Dsr-250n Firmware,7.2,HIGH,0.004889999981969595,false,false,false,false,,false,false,2020-01-25T18:46:52.000Z,0