Known Vulnerabilities for Dsl-224 by Dlink
Listed below are 4 of the newest known vulnerabilities associated with "Dsl-224" by "Dlink".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2024-0717 json | 5.3 - MEDIUM | 2024-01-19 | 2024-01-25 | |
| CVE-2023-32224 json | D-Link DSL-224 firmware version 3.0.10 CWE-307: Improper Restriction of Excessive Authentication Attempts | 9.8 - CRITICAL | 2023-06-28 | 2023-07-06 |
| CVE-2023-32223 json | D-Link DSL-224 firmware version 3.0.10 allows post authentication command execution via an unspecified method. | 8.8 - HIGH | 2023-06-28 | 2023-07-06 |
| CVE-2022-36786 json | DLINK - DSL-224 Post-auth RCE. DLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time ... | 9.9 - CRITICAL | 2022-11-17 | 2023-10-25 |