DSL-3782
by Dlink
CVEs (11)
| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2023-44959 | 0.04 | — | 0.47 | Oct 10, 2023 | An issue found in D-Link DSL-3782 v.1.03 and before allows remote authenticated users to execute arbitrary code as root via the Router IP Address fields of the network settings page. | |||
| CVE-2023-27216 | 0.02 | — | 0.28 | Apr 12, 2023 | An issue found in D-Link DSL-3782 v.1.03 allows remote authenticated users to execute arbitrary code as root via the network settings page. | |||
| CVE-2022-34527 | 0.02 | — | 0.25 | Jul 29, 2022 | D-Link DSL-3782 v1.03 and below was discovered to contain a command injection vulnerability via the function byte_4C0160. | |||
| CVE-2025-25892 | 0.00 | — | 0.00 | Feb 18, 2025 | A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the sstartip, sendip, dstartip, and dendip parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. | |||
| CVE-2025-25896 | 0.00 | — | 0.00 | Feb 18, 2025 | A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. | |||
| CVE-2025-25891 | 0.00 | — | 0.00 | Feb 18, 2025 | A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. | |||
| CVE-2025-25895 | 0.00 | — | 0.00 | Feb 18, 2025 | An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the public_type parameter. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet. | |||
| CVE-2025-25894 | 0.00 | — | 0.00 | Feb 18, 2025 | An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the samba_wg and samba_nbn parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet. | |||
| CVE-2025-25893 | 0.00 | — | 0.00 | Feb 18, 2025 | An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the inIP, insPort, inePort, exsPort, exePort, and protocol parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet. | |||
| CVE-2024-56914 | 0.00 | — | 0.00 | Jan 22, 2025 | D-Link DSL-3782 v1.01 is vulnerable to Buffer Overflow in /New_GUI/ParentalControl.asp. | |||
| CVE-2022-34528 | 0.00 | — | 0.01 | Jul 29, 2022 | D-Link DSL-3782 v1.03 and below was discovered to contain a stack overflow via the function getAttrValue. |
- CVE-2023-44959Oct 10, 2023risk 0.04cvss —epss 0.47
An issue found in D-Link DSL-3782 v.1.03 and before allows remote authenticated users to execute arbitrary code as root via the Router IP Address fields of the network settings page.
- CVE-2023-27216Apr 12, 2023risk 0.02cvss —epss 0.28
An issue found in D-Link DSL-3782 v.1.03 allows remote authenticated users to execute arbitrary code as root via the network settings page.
- CVE-2022-34527Jul 29, 2022risk 0.02cvss —epss 0.25
D-Link DSL-3782 v1.03 and below was discovered to contain a command injection vulnerability via the function byte_4C0160.
- CVE-2025-25892Feb 18, 2025risk 0.00cvss —epss 0.00
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the sstartip, sendip, dstartip, and dendip parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
- CVE-2025-25896Feb 18, 2025risk 0.00cvss —epss 0.00
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
- CVE-2025-25891Feb 18, 2025risk 0.00cvss —epss 0.00
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
- CVE-2025-25895Feb 18, 2025risk 0.00cvss —epss 0.00
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the public_type parameter. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet.
- CVE-2025-25894Feb 18, 2025risk 0.00cvss —epss 0.00
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the samba_wg and samba_nbn parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet.
- CVE-2025-25893Feb 18, 2025risk 0.00cvss —epss 0.00
An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the inIP, insPort, inePort, exsPort, exePort, and protocol parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet.
- CVE-2024-56914Jan 22, 2025risk 0.00cvss —epss 0.00
D-Link DSL-3782 v1.01 is vulnerable to Buffer Overflow in /New_GUI/ParentalControl.asp.
- CVE-2022-34528Jul 29, 2022risk 0.00cvss —epss 0.01
D-Link DSL-3782 v1.03 and below was discovered to contain a stack overflow via the function getAttrValue.