24h | 7d | 30d

Overview

  • D-Link
  • DWR-M920

23 Nov 2025
Published
23 Nov 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A weakness has been identified in D-Link DWR-M920 1.1.50. This affects the function sub_41C7FC of the file /boafrm/formPinManageSetup. This manipulation of the argument submit-url causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture

🚨 Buffer overflow (HIGH, CVSS 8.7) in D-Link DWR-M920 v1.1.50! Remote, unauthenticated exploit possible via /boafrm/formPinManageSetup—public exploit out. Restrict access, monitor now, patch ASAP. CVE-2025-13553 radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

10 Oct 2023
Published
14 Apr 2025
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.22%

KEV

Description

Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture
Unpatched and Powerful: How a Windows Update Tool Became Your Worst Security Nightmare Introduction: A critical Remote Code Execution (RCE) vulnerability was discovered within the Windows Update Health Tools, a trusted component managed by Microsoft. This flaw, designated as CVE-2023-38166,…
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • D-Link
  • DIR-852

23 Nov 2025
Published
23 Nov 2025
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
Pending

KEV

Description

A vulnerability was identified in D-Link DIR-852 1.00. This issue affects some unknown processing of the file /gena.cgi. Such manipulation of the argument service leads to command injection. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
🚨 CVE-2025-13562 — D-Link DIR-852 Command injection via ‘service’ parameter in /gena.cgi allows remote attackers to run system commands. Device is EoL—mitigate at the network level! ⚠️🔧 basefortify.eu/cve_reports/... #CVE #DLink #Router #Infosec
  • 0
  • 0
  • 0
  • Last hour

Overview

  • D-Link
  • DIR-822K

23 Nov 2025
Published
23 Nov 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A security flaw has been discovered in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. The impacted element is an unknown function of the file /boafrm/formWlEncrypt. The manipulation of the argument submit-url results in buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture

🚨 HIGH severity (CVSS 8.7) buffer overflow in D-Link DIR-822K (CVE-2025-13552): Remote, unauthenticated exploit in /boafrm/formWlEncrypt—public PoC available. Restrict WAN access & monitor for updates! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • D-Link
  • DIR-822K

23 Nov 2025
Published
23 Nov 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A vulnerability was determined in D-Link DIR-822K and DWR-M920 1.00_20250513164613/1.1.50. Impacted is an unknown function of the file /boafrm/formVpnConfigSetup. Executing manipulation of the argument submit-url can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture

🚨 CVE-2025-13550: HIGH severity buffer overflow (CVSS 8.7) in D-Link DIR-822K & DWR-M920 routers. Exploit is public. No patch—restrict access, monitor, and use IDS/IPS. Act now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • PHP Group
  • PHP

09 Jun 2024
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
94.39%

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture
The PHP-CGI Argument Injection Vulnerability (CVE-2024-4577): A Deep Dive into Exploitation and Hardening Introduction: A critical vulnerability in PHP-CGI, identified as CVE-2024-4577, has emerged, posing a significant threat to servers utilizing the `php-cgi` binary. This flaw allows attackers…
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDynamicDNSSettings' functionality, where the 'ServerAddress' and 'Hostname' parameters in prog.cgi are stored in NVRAM and later used by rc to construct system commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 20 hours ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 20h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 20 hours ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 20h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 20 hours ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 20h ago
Showing 11 to 19 of 19 CVEs