Vulnerabilities > Dlink > DIR 615 Firmware > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-23 | CVE-2021-42627 | Unspecified vulnerability in Dlink products The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page. | 9.8 |
2021-08-06 | CVE-2021-37388 | Classic Buffer Overflow vulnerability in Dlink Dir-615 Firmware 3.03Ww A buffer overflow in D-Link DIR-615 C2 3.03WW. | 9.8 |
2019-09-27 | CVE-2019-16920 | OS Command Injection vulnerability in Dlink products Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. | 9.8 |
2018-08-28 | CVE-2018-15839 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Dlink Dir-615 Firmware D-Link DIR-615 devices have a buffer overflow via a long Authorization HTTP header. | 9.8 |
2015-05-01 | CVE-2014-8361 | The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. | 9.8 |