cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-22853,https://securityvulnerability.io/vulnerability/CVE-2024-22853,Hardcoded Password in D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 Allows Remote Attackers to Obtain Root Access,"The D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 router contains a hardcoded password for the Alphanetworks account. This security flaw enables remote attackers to gain unauthorized root access through a telnet session, potentially compromising the device and the network it operates within. Network administrators should be aware of this vulnerability and take necessary precautions to secure their systems against potential exploitation.",D-LINK,Go-rt-ac750 Firmware,9.8,CRITICAL,0.0024999999441206455,false,true,false,true,true,false,false,2024-02-06T00:00:00.000Z,0 CVE-2024-22852,https://securityvulnerability.io/vulnerability/CVE-2024-22852,Stack-based buffer overflow vulnerability in D-Link Go-RT-AC750 GORTAC750_A1_FW_v101b03 allows attackers to enable telnet service via specially crafted payload,"The D-Link Go-RT-AC750 router, specifically version GORTAC750_A1_FW_v101b03, is vulnerable to a stack-based buffer overflow due to improper handling of input in the genacgi_main function. This security flaw can allow unauthenticated remote attackers to execute arbitrary code, potentially enabling the telnet service via a specially crafted payload. Users are recommended to apply the necessary security updates to mitigate exploitation risks and enhance their network security.",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.0010100000072270632,false,false,false,false,,false,false,2024-02-06T00:00:00.000Z,0 CVE-2024-22916,https://securityvulnerability.io/vulnerability/CVE-2024-22916,Stack Overflow Vulnerability in D-LINK Go-RT-AC750 Network Router,"The D-LINK Go-RT-AC750 router version v101b03 contains a vulnerability within the cgibin module, specifically in the call to the sprintf function located in sub_40E700. This vulnerability allows for a stack overflow condition due to insufficient input validation, potentially leading to remote code execution or denial of service. Users are advised to patch their devices promptly and follow best security practices.",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.0014400000218302011,false,false,false,false,,false,false,2024-01-16T00:00:00.000Z,0 CVE-2023-48842,https://securityvulnerability.io/vulnerability/CVE-2023-48842,Command Injection Vulnerability in D-Link Go-RT-AC750 Router,"A command injection vulnerability has been identified in the D-Link Go-RT-AC750 revA_v101b03 router. This vulnerability occurs via the 'service' parameter in the hedwig.cgi file, allowing an attacker to execute arbitrary commands on the affected device. This could lead to unauthorized access, data leakage, or control over the router, posing a significant risk to network integrity. Users are advised to update their firmware and implement security best practices to mitigate risks associated with this vulnerability.",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.011380000039935112,false,false,false,true,true,false,false,2023-12-01T00:00:00.000Z,0 CVE-2023-34800,https://securityvulnerability.io/vulnerability/CVE-2023-34800,Command Injection Flaw in D-Link Go-RT-AC750 Router,"The D-Link Go-RT-AC750 revA_v101b03 has been found vulnerable to a command injection issue through its service parameter at genacgi_main. This flaw could allow attackers to execute arbitrary commands on the device, potentially leading to unauthorized access and the manipulation of system functions. Users are strongly advised to follow vendor updates and apply necessary patches to safeguard their systems against potential exploits.",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.00431999983265996,false,false,false,false,,false,false,2023-06-15T00:00:00.000Z,0 CVE-2023-26822,https://securityvulnerability.io/vulnerability/CVE-2023-26822,Command Injection Vulnerability in D-Link Go-RT-AC750 Router,"The D-Link Go-RT-AC750 router has been found to be vulnerable to command injection through the service parameter in soapcgi.main. This allows attackers to execute arbitrary commands on the device, potentially compromising the integrity and security of the network. Users are advised to review security bulletins from D-Link and apply relevant firmware updates to mitigate this risk.",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.008829999715089798,false,false,false,false,,false,false,2023-04-01T23:15:00.000Z,0 CVE-2022-37055,https://securityvulnerability.io/vulnerability/CVE-2022-37055,,"D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main,",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.004600000102072954,false,false,false,false,,false,false,2022-08-28T16:05:21.000Z,0 CVE-2022-37056,https://securityvulnerability.io/vulnerability/CVE-2022-37056,,"D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main,",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.009549999609589577,false,false,false,false,,false,false,2022-08-28T16:03:48.000Z,0 CVE-2022-37057,https://securityvulnerability.io/vulnerability/CVE-2022-37057,,"D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Command Injection via cgibin, ssdpcgi_main.",D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.009549999609589577,false,false,false,false,,false,false,2022-08-28T16:00:15.000Z,0 CVE-2022-36526,https://securityvulnerability.io/vulnerability/CVE-2022-36526,,D-Link GO-RT-AC750 GORTAC750_revA_v101b03 & GO-RT-AC750_revB_FWv200b02 is vulnerable to Authentication Bypass via function phpcgi_main in cgibin.,D-Link,Go-rt-ac750 Firmware,7.5,HIGH,0.0012199999764561653,false,false,false,false,,false,false,2022-08-15T16:39:54.000Z,0 CVE-2022-36525,https://securityvulnerability.io/vulnerability/CVE-2022-36525,,D-Link Go-RT-AC750 GORTAC750_revA_v101b03 & GO-RT-AC750_revB_FWv200b02 is vulnerable to Buffer Overflow via authenticationcgi_main.,D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.001990000018849969,false,false,false,false,,false,false,2022-08-15T16:36:21.000Z,0 CVE-2022-36524,https://securityvulnerability.io/vulnerability/CVE-2022-36524,,D-Link GO-RT-AC750 GORTAC750_revA_v101b03 & GO-RT-AC750_revB_FWv200b02 is vulnerable to Static Default Credentials via /etc/init0.d/S80telnetd.sh.,D-Link,Go-rt-ac750 Firmware,7.5,HIGH,0.0014199999859556556,false,false,false,false,,false,false,2022-08-15T16:33:54.000Z,0 CVE-2022-36523,https://securityvulnerability.io/vulnerability/CVE-2022-36523,,D-Link Go-RT-AC750 GORTAC750_revA_v101b03 & GO-RT-AC750_revB_FWv200b02 is vulnerable to command injection via /htdocs/upnpinc/gena.php.,D-Link,Go-rt-ac750 Firmware,9.8,CRITICAL,0.0013099999632686377,false,false,false,false,,false,false,2022-08-15T16:30:52.000Z,0