📦 Dir 820l Firmware
by Dlink
🔍 What is Dir 820l Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A stack overflow vulnerability in D-Link DIR-820L routers allows remote attackers to execute arbitrary code by sending specially crafted requests to the affected function. This affects all users runni...
D-Link DIR-820L router firmware version 1.05B03 has insecure permissions that allow unauthorized access to sensitive functions. This vulnerability affects all users running this specific firmware vers...
This vulnerability in D-Link DIR-820L routers allows remote attackers to execute arbitrary code via a stack overflow in the cancelPing function. Attackers can potentially take full control of affected...
This vulnerability allows attackers to execute arbitrary operating system commands with root privileges on D-Link DIR-820L routers by injecting malicious payloads into the ping_addr parameter. Attacke...
This CVE describes an OS command injection vulnerability in D-Link DIR-820LA1 routers that allows attackers to execute arbitrary commands with root privileges. Attackers can exploit this by sending a ...
This vulnerability allows unauthenticated remote attackers to execute arbitrary commands on D-Link DIR-820L routers via HTTP POST requests to the 'get set ccp' endpoint. Attackers can gain full contro...
A critical Remote Command Execution vulnerability exists in multiple D-Link router models via the DDNS function in the ncc2 binary. Attackers can execute arbitrary commands with root privileges on aff...
CVE-2025-52079 allows unauthenticated attackers to change the administrator password on D-Link DIR-820L routers via a crafted POST request to /get_set.ccp. This vulnerability affects all users of the ...
A stack overflow vulnerability in D-Link DIR-820L routers allows attackers to cause denial of service by sending specially crafted requests to the lan.asp endpoint. This affects users of D-Link DIR-82...