Dlink Dir-300 Firmware vulnerabilities
7 known vulnerabilities affecting dlink/dir-300_firmware.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH1MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2013-10069CRITICALCVSS 10.0≤ 2.132025-08-05
CVE-2013-10069 [CRITICAL] CWE-78 CVE-2013-10069: The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (
The web interface of multiple D-Link routers, including DIR-600 rev B (≤2.14b01) and DIR-300 rev B (≤2.13), contains an unauthenticated OS command injection vulnerability in command.php, which improperly handles the cmd POST parameter. A remote attacker can exploit this flaw without authentication to spawn a Telnet service on a specified port, enab
nvd
CVE-2013-10048CRITICALCVSS 9.3≤ 2.132025-08-01
CVE-2013-10048 [CRITICAL] CWE-78 CVE-2013-10048: An OS command injection vulnerability exists in various legacy D-Link routers—including DIR-300 rev
An OS command injection vulnerability exists in various legacy D-Link routers—including DIR-300 rev B and DIR-600 (firmware ≤ 2.13 and ≤ 2.14b01, respectively)—due to improper input handling in the unauthenticated command.php endpoint. By sending specially crafted POST requests, a remote attacker can execute arbitrary shell commands with root privil
nvd
CVE-2013-10050HIGHCVSS 8.7≤ 1.052025-08-01
CVE-2013-10050 [HIGH] CWE-78 CVE-2013-10050: An OS command injection vulnerability exists in multiple D-Link routers—confirmed on DIR-300 rev A (
An OS command injection vulnerability exists in multiple D-Link routers—confirmed on DIR-300 rev A (v1.05) and DIR-615 rev D (v4.13)—via the authenticated tools_vct.xgi CGI endpoint. The web interface fails to properly sanitize user-supplied input in the pingIp parameter, allowing attackers with valid credentials to inject arbitrary shell commands. Exp
nvd
CVE-2024-41616CRITICALCVSS 9.8v1.06b05_ww2024-08-06
CVE-2024-41616 [CRITICAL] CWE-798 CVE-2024-41616: D-Link DIR-300 REVA FIRMWARE v1.06B05_WW contains hardcoded credentials in the Telnet service.
D-Link DIR-300 REVA FIRMWARE v1.06B05_WW contains hardcoded credentials in the Telnet service.
nvd
CVE-2024-0717MEDIUMCVSS 5.3≤ 2024-01-122024-01-19
CVE-2024-0717 [MEDIUM] CWE-200 CVE-2024-0717: A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DI
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530,
nvd
CVE-2023-31814CRITICALCVSS 9.8≤ 1.06≤ 2.062023-05-23
CVE-2023-31814 [CRITICAL] CWE-706 CVE-2023-31814: D-Link DIR-300 firmware <=REVA1.06 and <=REVB2.06 is vulnerable to File inclusion via /model/__lang_
D-Link DIR-300 firmware <=REVA1.06 and <=REVB2.06 is vulnerable to File inclusion via /model/__lang_msg.php.
nvd
CVE-2013-7471CRITICALCVSS 9.8v2.14b012019-06-11
CVE-2013-7471 [CRITICAL] CWE-77 CVE-2013-7471: An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 be
An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.
nvd