On D-Link DIR-819 Firmware Version 1.06 Hardware Version A1 devices, it is possible to trigger a Denial of Service via the sys_token parameter in a cgi-bin/webproc?getpage=html/index.html request.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry |
https://github.com/whokilleddb/dlink-dir-819-dos | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Product |
http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry |
https://github.com/whokilleddb/dlink-dir-819-dos | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/whokilleddb/dlink-dir-819-dos - Exploit, Third Party Advisory | |
References | () https://www.dlink.com/en/security-bulletin/ - Product |
Information
Published : 2023-04-16 02:15
Updated : 2024-11-21 07:22
NVD link : CVE-2022-40946
Mitre link : CVE-2022-40946
CVE.ORG link : CVE-2022-40946
JSON object : View
Products Affected
dlink
- dir-819_firmware
- dir-819
CWE