|Category:||Web application abuses|
|Title:||D-Link DIR-816L <= 2.06.B09 Multiple Vulnerabilities|
|Summary:||D-Link DIR-816L is prone to multiple vulnerabilities.|
D-Link DIR-816L is prone to multiple vulnerabilities.
The following vulnerabilities exist:
- Command injection in the UPnP via a crafted M-SEARCH packet (CVE-2020-15893)
- Exposed administration function, allowing unauthorized access to the few sensitive information (CVE-2020-15894)
- Reflected XSS due to an unescaped value on the device configuration webpage (CVE-2020-15895)
D-Link DIR-816L version 2.06.B09 and prior.
No solution was made available by the vendor. General solution options are to
upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
The vendor states: DIR-816L (EOS: 03/01/2016) have reached its End-of-Support ('EOS') / End-of-Life ('EOL') Date.
As a general policy, when the product reaches EOS/EOL, it can no longer be supported, and all firmware
development for the product ceases, except in certain unique situations.
Common Vulnerability Exposure (CVE) ID: CVE-2020-15893|
Common Vulnerability Exposure (CVE) ID: CVE-2020-15894
Common Vulnerability Exposure (CVE) ID: CVE-2020-15895
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.