CVE-2024-0717 (GCVE-0-2024-0717)
Vulnerability from cvelistv5 – Published: 2024-01-19 15:31 – Updated: 2025-05-30 14:26
VLAI?
Summary
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability.
Severity ?
5.3 (Medium)
5.3 (Medium)
CWE
- CWE-200 - Information Disclosure
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| D-Link | DAP-1360 |
Affected:
20240112
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
99iz (VulDB User)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:11:35.784Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
],
"url": "https://vuldb.com/?id.251542"
},
{
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.251542"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://github.com/999zzzzz/D-Link"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0717",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-08T15:34:37.136211Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-30T14:26:30.162Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DAP-1360",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-300",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-615",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-615GF",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-615S",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-615T",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-620",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-620S",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-806A",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-815",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-815AC",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-815S",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-816",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-820",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-822",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-825",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-825AC",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-825ACF",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-825ACG1",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-841",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-842",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-842S",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-843",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-853",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-878",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-882",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-1210",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-1260",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-2150",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-X1530",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DIR-X1860",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DSL-224",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DSL-245GR",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DSL-2640U",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DSL-2750U",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DSL-G2452GR",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DVG-5402G",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DVG-5402G",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DVG-5402GFRU",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DVG-N5402G",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DVG-N5402G-IL",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DWM-312W",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DWM-321",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DWR-921",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "DWR-953",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
},
{
"modules": [
"HTTP GET Request Handler"
],
"product": "Good Line Router v2",
"vendor": "D-Link",
"versions": [
{
"status": "affected",
"version": "20240112"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "99iz (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability."
},
{
"lang": "de",
"value": "In D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 bis 20240112 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /devinfo der Komponente HTTP GET Request Handler. Mittels dem Manipulieren des Arguments area mit der Eingabe notice|net|version mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Information Disclosure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-19T15:31:04.290Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.251542"
},
{
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.251542"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/999zzzzz/D-Link"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-01-19T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-01-19T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-01-19T08:26:48.000Z",
"value": "VulDB entry last update"
}
],
"title": "D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-0717",
"datePublished": "2024-01-19T15:31:04.290Z",
"dateReserved": "2024-01-19T07:21:32.386Z",
"dateUpdated": "2025-05-30T14:26:30.162Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-825acg1_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"81B11B0F-8307-4845-A322-2CB3FE85840D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-825acg1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"129E5D3B-B94F-4F33-B64C-35115AFB1165\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-841_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"2F4A6809-F1A7-416B-9345-9F7A37B7BF71\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-841:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D789C69F-5063-43B7-AB71-5B0C9294D55E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-1260_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"19167352-59AF-4D47-BC80-A1599F24DE0A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-1260:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF5C311E-DB22-452B-BC26-265E3A84B57C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-822_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"9867D17E-123A-4A33-A058-12BF1AC453F8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3894F0E-37F8-4A89-87AC-1DB524D4AE04\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-x1530_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"2899DF29-FDF6-4D57-8846-3DADCC5349A0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-x1530:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FF2C35C-8C59-4D36-8CC9-AE03853B40D4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-825_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"6CCF939D-719A-4682-ADD8-C1DE484E5377\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7038F8A9-03F3-4442-B371-84801EF05447\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"9302B88E-28ED-486C-9E64-D38B9B857E89\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E92E959-C211-4979-A233-163BEFCF6F0D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-842_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"5039D893-1396-42D0-91D9-2E02B974EF98\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-842:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C05AE997-7966-4CCA-B58A-93B684D55F60\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-853_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"9001FB50-6B3D-4EE2-BC9F-920DE95BDC58\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-853:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"332F4880-9D76-4C74-95DE-730F72879EC4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-1210_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"F28A25B0-D5E9-4668-B00A-F4F2B34C7457\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-1210:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28A60F07-0DA7-47AD-B3C0-E1F6ED630C89\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-806a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"CEAC2985-B6E3-4215-8BA5-B6653BCB5EC6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-806a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"926B41A6-009F-444D-BE5C-B517F844E99B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-815_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"02D27414-7D38-40A6-978B-6A9417A2D09C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-815:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50618B63-304B-4A61-AA50-5154E8690E88\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dsl-245gr_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"CA077FA3-FA87-4B2D-897E-A7B1A7BC7642\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dsl-245gr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DF8EB08-A378-4F14-ADD9-E97C244DD80D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dsl-g2452gr_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"DB2BFA6C-D260-4B9F-952A-E185BCD0F415\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dsl-g2452gr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"517C1250-268D-45A7-9BD1-EACE4BA1BA82\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-878_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"B2DAE783-B0F3-4765-A7FD-945F041369E7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D288C73-F89A-47FF-AF11-143C3DFDF942\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-825acf_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"D626BD4C-D4D2-4CC5-91EF-AF938A5C1983\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-825acf:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD011B62-C988-463A-8672-F5BD0D984179\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-615t_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"4477BE0A-BC4A-4534-8FED-3045CD373008\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-615t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"951C4DD2-B472-401B-A1FF-4FE5957A5213\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"87DB97AC-CBBA-422D-8DE3-E82DC1D73A98\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC2143B3-B3A0-41D6-B8F7-78CE40B1759C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-842s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"BDCB1321-793F-455C-847C-E5033A920F1F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-842s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"996A7C60-49BB-46BE-8A2C-CEABA71FBEB3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-815s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"8F2A35FF-2623-4D3C-920A-42B836984085\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-815s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C6BA467-0AB4-42BF-BBD1-59E2FA03CF42\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dsl-2640u_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"C0D3126B-FE49-4C78-A734-95C3C0276AE2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dsl-2640u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09E483F8-5B0E-498A-B1CA-8F1EA5FD350C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-2150_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"A3A04F04-D2DC-4DC9-B44B-F5DEC933E9AC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-2150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06F065A1-2599-442C-AB55-DE24D47A7869\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"A61E0E68-F20D-4663-9855-B71F60266B83\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43F0390E-B9E1-463A-A08C-B529778EE72F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-615s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"C9FE9B1C-6246-458F-AF0D-E624D1DBFAE2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-615s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A74ABB9E-FD49-431A-BB23-9DCA44B8A806\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-620_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"7F098AF6-DC38-4D50-9316-809349CB573E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-620:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DF4C296-C8AA-4197-B280-ED5D22C70156\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dvg-5402g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"D27F65EC-6C50-4691-99A2-EA1C1D3DE0C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dvg-5402g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1C2C7F0-FE1C-4B95-9636-FA6041C85C44\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-882_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"A2472D8A-C45A-447B-A296-B2BB93A7E948\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6ECB8ED-F3A2-4C05-8570-719ECB166B09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dwm-312w_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"9B065B35-4FC9-4D4C-823D-F06418454CC9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dwm-312w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F03A354-6EBE-4081-9234-00DCB747EAB5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-815\\\\/ac_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"A78E427F-121A-4453-B0BD-48C2A516FE5A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-815\\\\/ac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"291ACFCF-032B-466D-9C5B-D5CCF9CA7DD9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dsl-224_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"500B6A19-ED9A-404C-A071-D77F4263288F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dsl-224:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C744969-0177-4E24-8E60-1DB0EFE1E5C5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dwm-321_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"29D9E5D9-B9E8-4BD0-B6DC-F253559925B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dwm-321:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66BD8659-B935-441C-9AFF-20E8AE157E2B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-x1860_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"1E3BFEE9-5E48-4D94-977B-7A79CF2AEB1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-x1860:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A46288E8-3105-4FAA-80E7-94EECD1764F2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dap-1360_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"D83F75D8-3563-4A07-A794-6970A63EAA9B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dap-1360:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E95864-1D6F-4BB2-9940-144385527271\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-820_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"D1790403-AC76-4A3E-B727-836AF7ABCF10\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-820:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C30FD50-1AC6-476A-85B9-30D24E0663DC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-843_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"7B29BE39-F488-4C74-8B5C-F8D6C3256F96\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-843:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85293557-FC2C-4A56-8EA0-6E12968E7FBF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dvg-5402g\\\\/gfru_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"672ADB90-0062-48CE-B437-28919980A4B0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dvg-5402g\\\\/gfru:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4C4C431-489D-4F09-A312-B4FBCC38E91E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dwr-953_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"8AA2FBAD-C15D-4908-AB8B-23087354D4A8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dwr-953:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E37EEA4D-B3F6-4A39-971C-07C1CB0BA209\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dvg-n5402g\\\\/il_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"236D3547-1FB9-44B3-ABD2-F948912B6D4D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dvg-n5402g\\\\/il:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B118E9B4-961D-46B6-95E3-514A99C8BFA8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-825ac_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"065F9B59-FBA8-4798-8F29-82741815B0CD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-825ac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C8BB581-D7A3-494A-AB43-BCAE390ED692\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-620s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"CC3409D3-C046-410B-96BB-128FC1C2C097\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-620s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9932A023-1CE6-4915-812D-F3CE5EAB114C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dvg-n5402g_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"5AEE17B3-F77C-4F3A-92D7-99BFF1F1A824\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dvg-n5402g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1127DA2D-4024-4962-B8FB-C81E07B1AE94\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dsl-2750u_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"8B0191F0-DB03-479F-BA89-8CBF6F378BD6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dsl-2750u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5A7A48A-C126-4EF2-91F8-A8D9987525FF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-615gf_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"43227AC8-29BA-43E9-AB4F-10C83F222514\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-615gf:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9199BBF6-42E4-418E-8A3C-7F69CCB3D145\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:dlink:dir-816_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2024-01-12\", \"matchCriteriaId\": \"876FA028-A6B1-488A-A29D-038D93539C07\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B54058C1-B58F-434A-ABF0-A6B314A1AB14\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad fue encontrada en D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815 y clasificada como cr\\u00edtica , DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR -843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U , DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 y Good Line Router v2 hasta 20240112 Esta vulnerabilidad afecta a c\\u00f3digo desconocido del archivo /devinfo del componente HTTP GET Request Handler. La manipulaci\\u00f3n del \\u00e1rea de argumentos con la entrada aviso|net|versi\\u00f3n conduce a la divulgaci\\u00f3n de informaci\\u00f3n. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\\u00fablico y puede utilizarse. VDB-251542 es el identificador asignado a esta vulnerabilidad.\"}]",
"id": "CVE-2024-0717",
"lastModified": "2024-11-21T08:47:12.370",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2024-01-19T16:15:11.190",
"references": "[{\"url\": \"https://github.com/999zzzzz/D-Link\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://vuldb.com/?ctiid.251542\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://vuldb.com/?id.251542\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/999zzzzz/D-Link\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://vuldb.com/?ctiid.251542\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://vuldb.com/?id.251542\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-0717\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2024-01-19T16:15:11.190\",\"lastModified\":\"2024-11-21T08:47:12.370\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad fue encontrada en D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815 y clasificada como cr\u00edtica , DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR -843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U , DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 y Good Line Router v2 hasta 20240112 Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /devinfo del componente HTTP GET Request Handler. La manipulaci\u00f3n del \u00e1rea de argumentos con la entrada aviso|net|versi\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-251542 es el identificador asignado a esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-825acg1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"81B11B0F-8307-4845-A322-2CB3FE85840D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-825acg1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"129E5D3B-B94F-4F33-B64C-35115AFB1165\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-841_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"2F4A6809-F1A7-416B-9345-9F7A37B7BF71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-841:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D789C69F-5063-43B7-AB71-5B0C9294D55E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-1260_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"19167352-59AF-4D47-BC80-A1599F24DE0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-1260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF5C311E-DB22-452B-BC26-265E3A84B57C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-822_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"9867D17E-123A-4A33-A058-12BF1AC453F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3894F0E-37F8-4A89-87AC-1DB524D4AE04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-x1530_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"2899DF29-FDF6-4D57-8846-3DADCC5349A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-x1530:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF2C35C-8C59-4D36-8CC9-AE03853B40D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-825_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"6CCF939D-719A-4682-ADD8-C1DE484E5377\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7038F8A9-03F3-4442-B371-84801EF05447\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"9302B88E-28ED-486C-9E64-D38B9B857E89\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E92E959-C211-4979-A233-163BEFCF6F0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-842_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"5039D893-1396-42D0-91D9-2E02B974EF98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-842:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05AE997-7966-4CCA-B58A-93B684D55F60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-853_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"9001FB50-6B3D-4EE2-BC9F-920DE95BDC58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332F4880-9D76-4C74-95DE-730F72879EC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-1210_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"F28A25B0-D5E9-4668-B00A-F4F2B34C7457\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-1210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A60F07-0DA7-47AD-B3C0-E1F6ED630C89\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-806a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"CEAC2985-B6E3-4215-8BA5-B6653BCB5EC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-806a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"926B41A6-009F-444D-BE5C-B517F844E99B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-815_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"02D27414-7D38-40A6-978B-6A9417A2D09C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-815:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50618B63-304B-4A61-AA50-5154E8690E88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dsl-245gr_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"CA077FA3-FA87-4B2D-897E-A7B1A7BC7642\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dsl-245gr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF8EB08-A378-4F14-ADD9-E97C244DD80D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dsl-g2452gr_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"DB2BFA6C-D260-4B9F-952A-E185BCD0F415\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dsl-g2452gr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"517C1250-268D-45A7-9BD1-EACE4BA1BA82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-878_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"B2DAE783-B0F3-4765-A7FD-945F041369E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D288C73-F89A-47FF-AF11-143C3DFDF942\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-825acf_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"D626BD4C-D4D2-4CC5-91EF-AF938A5C1983\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-825acf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD011B62-C988-463A-8672-F5BD0D984179\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-615t_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"4477BE0A-BC4A-4534-8FED-3045CD373008\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-615t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951C4DD2-B472-401B-A1FF-4FE5957A5213\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"87DB97AC-CBBA-422D-8DE3-E82DC1D73A98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC2143B3-B3A0-41D6-B8F7-78CE40B1759C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-842s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"BDCB1321-793F-455C-847C-E5033A920F1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-842s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996A7C60-49BB-46BE-8A2C-CEABA71FBEB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-815s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"8F2A35FF-2623-4D3C-920A-42B836984085\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-815s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C6BA467-0AB4-42BF-BBD1-59E2FA03CF42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dsl-2640u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"C0D3126B-FE49-4C78-A734-95C3C0276AE2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dsl-2640u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E483F8-5B0E-498A-B1CA-8F1EA5FD350C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-2150_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"A3A04F04-D2DC-4DC9-B44B-F5DEC933E9AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-2150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06F065A1-2599-442C-AB55-DE24D47A7869\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"A61E0E68-F20D-4663-9855-B71F60266B83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F0390E-B9E1-463A-A08C-B529778EE72F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-615s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"C9FE9B1C-6246-458F-AF0D-E624D1DBFAE2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-615s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74ABB9E-FD49-431A-BB23-9DCA44B8A806\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-620_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"7F098AF6-DC38-4D50-9316-809349CB573E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4C296-C8AA-4197-B280-ED5D22C70156\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dvg-5402g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"D27F65EC-6C50-4691-99A2-EA1C1D3DE0C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dvg-5402g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C2C7F0-FE1C-4B95-9636-FA6041C85C44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-882_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"A2472D8A-C45A-447B-A296-B2BB93A7E948\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6ECB8ED-F3A2-4C05-8570-719ECB166B09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dwm-312w_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"9B065B35-4FC9-4D4C-823D-F06418454CC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dwm-312w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F03A354-6EBE-4081-9234-00DCB747EAB5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-815\\\\/ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"A78E427F-121A-4453-B0BD-48C2A516FE5A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-815\\\\/ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"291ACFCF-032B-466D-9C5B-D5CCF9CA7DD9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dsl-224_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"500B6A19-ED9A-404C-A071-D77F4263288F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dsl-224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C744969-0177-4E24-8E60-1DB0EFE1E5C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dwm-321_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"29D9E5D9-B9E8-4BD0-B6DC-F253559925B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dwm-321:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BD8659-B935-441C-9AFF-20E8AE157E2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-x1860_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"1E3BFEE9-5E48-4D94-977B-7A79CF2AEB1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-x1860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46288E8-3105-4FAA-80E7-94EECD1764F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dap-1360_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"D83F75D8-3563-4A07-A794-6970A63EAA9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dap-1360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E95864-1D6F-4BB2-9940-144385527271\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-820_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"D1790403-AC76-4A3E-B727-836AF7ABCF10\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C30FD50-1AC6-476A-85B9-30D24E0663DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-843_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"7B29BE39-F488-4C74-8B5C-F8D6C3256F96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-843:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85293557-FC2C-4A56-8EA0-6E12968E7FBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dvg-5402g\\\\/gfru_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"672ADB90-0062-48CE-B437-28919980A4B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dvg-5402g\\\\/gfru:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C4C431-489D-4F09-A312-B4FBCC38E91E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dwr-953_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"8AA2FBAD-C15D-4908-AB8B-23087354D4A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dwr-953:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37EEA4D-B3F6-4A39-971C-07C1CB0BA209\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dvg-n5402g\\\\/il_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"236D3547-1FB9-44B3-ABD2-F948912B6D4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dvg-n5402g\\\\/il:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B118E9B4-961D-46B6-95E3-514A99C8BFA8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-825ac_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"065F9B59-FBA8-4798-8F29-82741815B0CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-825ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8BB581-D7A3-494A-AB43-BCAE390ED692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-620s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"CC3409D3-C046-410B-96BB-128FC1C2C097\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-620s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9932A023-1CE6-4915-812D-F3CE5EAB114C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dvg-n5402g_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"5AEE17B3-F77C-4F3A-92D7-99BFF1F1A824\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dvg-n5402g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1127DA2D-4024-4962-B8FB-C81E07B1AE94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dsl-2750u_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"8B0191F0-DB03-479F-BA89-8CBF6F378BD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dsl-2750u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5A7A48A-C126-4EF2-91F8-A8D9987525FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-615gf_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"43227AC8-29BA-43E9-AB4F-10C83F222514\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-615gf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9199BBF6-42E4-418E-8A3C-7F69CCB3D145\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dlink:dir-816_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2024-01-12\",\"matchCriteriaId\":\"876FA028-A6B1-488A-A29D-038D93539C07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54058C1-B58F-434A-ABF0-A6B314A1AB14\"}]}]}],\"references\":[{\"url\":\"https://github.com/999zzzzz/D-Link\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?ctiid.251542\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?id.251542\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/999zzzzz/D-Link\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?ctiid.251542\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://vuldb.com/?id.251542\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://vuldb.com/?id.251542\", \"tags\": [\"vdb-entry\", \"technical-description\", \"x_transferred\"]}, {\"url\": \"https://vuldb.com/?ctiid.251542\", \"tags\": [\"signature\", \"permissions-required\", \"x_transferred\"]}, {\"url\": \"https://github.com/999zzzzz/D-Link\", \"tags\": [\"exploit\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T18:11:35.784Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-0717\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-08T15:34:37.136211Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-08T15:34:38.578Z\"}}], \"cna\": {\"title\": \"D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"99iz (VulDB User)\"}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 5, \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\"}}], \"affected\": [{\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DAP-1360\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-300\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-615\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-615GF\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-615S\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-615T\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-620\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-620S\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-806A\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-815\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-815AC\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-815S\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-816\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-820\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-822\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-825\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-825AC\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-825ACF\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-825ACG1\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-841\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-842\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-842S\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-843\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-853\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-878\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-882\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-1210\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-1260\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-2150\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-X1530\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DIR-X1860\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DSL-224\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DSL-245GR\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DSL-2640U\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DSL-2750U\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DSL-G2452GR\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DVG-5402G\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DVG-5402G\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DVG-5402GFRU\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DVG-N5402G\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DVG-N5402G-IL\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DWM-312W\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DWM-321\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DWR-921\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"DWR-953\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}, {\"vendor\": \"D-Link\", \"modules\": [\"HTTP GET Request Handler\"], \"product\": \"Good Line Router v2\", \"versions\": [{\"status\": \"affected\", \"version\": \"20240112\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-01-19T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2024-01-19T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2024-01-19T08:26:48.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.251542\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.251542\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://github.com/999zzzzz/D-Link\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability.\"}, {\"lang\": \"de\", \"value\": \"In D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 bis 20240112 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /devinfo der Komponente HTTP GET Request Handler. Mittels dem Manipulieren des Arguments area mit der Eingabe notice|net|version mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \\u00fcber das Netzwerk passieren. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Information Disclosure\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2024-01-19T15:31:04.290Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-0717\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-30T14:26:30.162Z\", \"dateReserved\": \"2024-01-19T07:21:32.386Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2024-01-19T15:31:04.290Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…