VYPR

DIR-846W

by Dlink

CVEs (9)

  • CVE-2023-33735May 31, 2023
    risk 0.04cvss epss 0.53

    D-Link DIR-846 v1.00A52 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in the /HNAP1 interface.

  • CVE-2022-46641Dec 23, 2022
    risk 0.01cvss epss 0.07

    D-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the lan(0)_dhcps_staticlist parameter in the SetIpMacBindSettings function.

  • CVE-2022-46642Dec 23, 2022
    risk 0.01cvss epss 0.07

    D-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the auto_upgrade_hour parameter in the SetAutoUpgradeInfo function.

  • CVE-2020-21016Oct 31, 2022
    risk 0.01cvss epss 0.10

    D-Link DIR-846 devices with firmware 100A35 allow remote attackers to execute arbitrary code as root via HNAP1/control/SetGuestWLanSettings.php.

  • CVE-2024-44342Aug 27, 2024
    risk 0.00cvss epss 0.01

    D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the wl(0).(0)_ssid parameter. This vulnerability is exploited via a crafted POST request.

  • CVE-2024-44340Aug 27, 2024
    risk 0.00cvss epss 0.01

    D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings.

  • CVE-2024-44341Aug 27, 2024
    risk 0.00cvss epss 0.04

    D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.

  • CVE-2024-41622Aug 27, 2024
    risk 0.00cvss epss 0.02

    D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in /HNAP1/ interface.

  • CVE-2023-6580Dec 7, 2023
    risk 0.00cvss epss 0.00

    A vulnerability, which was classified as critical, was found in D-Link DIR-846 FW100A53DBR. This affects an unknown part of the file /HNAP1/ of the component QoS POST Handler. The manipulation of the argument smartqos_express_devices/smartqos_normal_devices leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.