Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

dir-830l

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

2
Related CVEsRelated VendorsRelated AssignersReports
2Vulnerabilities found

CVE-2021-45382
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-94.23% / 99.92%
||
7 Day CHG~0.00%
Published-17 Feb, 2022 | 20:07
Updated-10 Nov, 2025 | 14:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-25||The impacted product is end-of-life and should be disconnected if still in use.

A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-820ldir-830l_firmwaredir-810l_firmwaredir-830ldir-820lw_firmwaredir-836l_firmwaredir-820lwdir-820l_firmwaredir-826l_firmwaredir-836ldir-810ldir-826ln/aMultiple Routers
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2015-1187
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-81.23% / 99.13%
||
7 Day CHG~0.00%
Published-21 Sep, 2017 | 16:00
Updated-22 Oct, 2025 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||The impacted product is end-of-life and should be disconnected if still in use.

The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.

Action-Not Available
Vendor-n/aD-Link CorporationTRENDnet, Inc.
Product-dir-808ldir-826ldir-636l_firmwaretew-731brdir-830l_firmwaretew-711brdir-836l_firmwaretew-652brtew-813dru_firmwaretew-813drudir-820l_firmwaredir-808l_firmwaretew-810dr_firmwaretew-652br_firmwaretew-711br_firmwaredir-820ldir-651dir-636ltew-651br_firmwaredir-626l_firmwaredir-810ltew-810drdir-830ldir-810l_firmwaretew-651brdir-651_firmwaredir-826l_firmwaredir-836ltew-731br_firmwaredir-626ln/aMultiple Devices
CWE ID-CWE-287
Improper Authentication