D-Link DSR-250N Persistent Root Access

Overview :
D-Link DSR-250N devices with firmware 1.05B73_WW allow Persistent Root Access because of the admin password for the admin account.
Affected Product(s) :
  • D-Link DSR-250N
Vulnerability Details :
CVE ID : CVE-2012-6613
Persistently become real root on your D-Link DSR-250N . If you wanted to do real firewalling on this box, but the router software screamed after getting hacked

Solution :

Update according to the vendor specifications

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2023-1424 : MITSUBISHI ELECTRIC MELSEC IQ-F PACKETS BUFFER OVERFLOW

CVE-2023-1424 : MITSUBISHI ELECTRIC MELSEC IQ-F PACKETS BUFFER OVERFLOW

Description Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU

CVE-2023-2845 : CLOUDEXPLORER-LITE UP TO 1.0.X ACCESS CONTROL

CVE-2023-2845 : CLOUDEXPLORER-LITE UP TO 1.0.X ACCESS CONTROL

Description Improper Access Control in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v1.1.0. References https://huntr.dev/bounties/ac10e81c-998e-4425-9d74-b985d9b0254c https://github.com/cloudexplorer-dev/cloudexplorer-lite/commit/d9f55a44e579d312977b02317b2020de758b763a For More Information MITRE

CVE-2023-32336 : IBM INFOSPHERE INFORMATION SERVER 11.7 RMI SERVICE DESERIALIZATION

CVE-2023-32336 : IBM INFOSPHERE INFORMATION SERVER 11.7 RMI SERVICE DESERIALIZATION

Description IBM InfoSphere Information Server 11.7 is affected by a remote code execution vulnerability due to insecure deserialization in an