A local file inclusion (LFI) vulnerability in D-Link DIR 819 v1.06 allows attackers to cause a Denial of Service (DoS) or access sensitive server information via manipulation of the getpage parameter in a crafted web request.
References
| Link | Resource |
|---|---|
| https://whokilleddb.github.io/blogs/posts/dlink_dir-819_lfi_and_dos/ | Exploit Third Party Advisory |
| https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
| https://whokilleddb.github.io/blogs/posts/dlink_dir-819_lfi_and_dos/ | Exploit Third Party Advisory |
| https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://whokilleddb.github.io/blogs/posts/dlink_dir-819_lfi_and_dos/ - Exploit, Third Party Advisory | |
| References | () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory |
08 Aug 2023, 14:22
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 |
Information
Published : 2022-09-08 18:15
Updated : 2024-11-21 07:16
NVD link : CVE-2022-38258
Mitre link : CVE-2022-38258
CVE.ORG link : CVE-2022-38258
JSON object : View
Products Affected
dlink
- dir-819
- dir-819_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
