Dlink Dir-806 Firmware vulnerabilities
5 known vulnerabilities affecting dlink/dir-806_firmware.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2025-4340MEDIUMCVSS 5.3≤ 100cnb112025-05-06
CVE-2025-4340 [MEDIUM] CWE-74 CVE-2025-4340: A vulnerability classified as critical has been found in D-Link DIR-890L and DIR-806A1 up to 100CNb1
A vulnerability classified as critical has been found in D-Link DIR-890L and DIR-806A1 up to 100CNb11/108B03. Affected is the function sub_175C8 of the file /htdocs/soap.cgi. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only af
nvd
CVE-2023-43130CRITICALCVSS 9.8v100cnb112023-09-22
CVE-2023-43130 [CRITICAL] CWE-78 CVE-2023-43130: D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection.
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection.
nvd
CVE-2023-43129CRITICALCVSS 9.8v100cnb112023-09-22
CVE-2023-43129 [CRITICAL] CWE-78 CVE-2023-43129: D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of REMOTE_PORT parameters.
nvd
CVE-2023-43128CRITICALCVSS 9.8v100cnb112023-09-21
CVE-2023-43128 [CRITICAL] CWE-77 CVE-2023-43128: D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of HTTP_ST parameters.
nvd
CVE-2019-10892CRITICALCVSS 9.8v1.02019-09-06
CVE-2019-10892 [CRITICAL] CWE-787 CVE-2019-10892: An issue was discovered in D-Link DIR-806 devices. There is a stack-based buffer overflow in functio
An issue was discovered in D-Link DIR-806 devices. There is a stack-based buffer overflow in function hnap_main at /htdocs/cgibin. The function will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by users. And it finally leads to a stack-based buffer overflow via a special HTTP header.
nvd