Overview
- D-Link
- DIR-615
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
⚠️ CVE-2026-2151: HIGH severity OS command injection in D-Link DIR-615 v4.10 (DMZ Host/adv_firewall.php) enables unauthenticated remote code execution. No patch — replace or isolate affected routers ASAP. https://radar.offseq.com/threat/cve-2026-2151-os-command-injection-in-d-link-dir-6-3276f328 #OffSeq #DLink #CVE20262151 #Infosec
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Overview
- D-Link
- DIR-823X
Description
Statistics
- 1 Post
Fediverse
⚠️ HIGH-severity OS command injection (CVE-2026-2210) in D-Link DIR-823X v250416 — remote, unauthenticated code execution possible. Patch firmware or restrict admin access now. European orgs: prioritize response! https://radar.offseq.com/threat/cve-2026-2210-os-command-injection-in-d-link-dir-8-a510703e #OffSeq #Vuln #DLink
Overview
- D-Link
- DIR-823X
Description
Statistics
- 1 Post
Fediverse
🛡️ CVE-2026-2175: HIGH severity OS command injection in D-Link DIR-823X (v250416) via /goform/set_upnp. No auth needed; public exploit out. Patch ASAP or disable UPnP & segment networks. https://radar.offseq.com/threat/cve-2026-2175-os-command-injection-in-d-link-dir-8-2593454d #OffSeq #DLink #Vuln #RouterAlert
Overview
- Red Hat
- Red Hat Enterprise Linux 10
- libxml2
Description
Statistics
- 1 Post
Overview
- Go standard library
- archive/zip
- archive/zip
Description
Statistics
- 1 Post
Overview
- Go standard library
- crypto/tls
- crypto/tls
Description
Statistics
- 1 Post
Overview
- Go standard library
- net/url
- net/url
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post