This is a simple PHP script that checks to see if your D-Link device is vulnerable to the User-Agent backdoor.
b0f9b07e55de0f72f7056f20fafc5118ca5dbd0af300d0146663b52ab3d742d7
D-Link DAP-1325 suffers from an insecure direct object reference vulnerability.
4548841ea03f3266179288f0cf24c3beb3d9e505ee2916e0c7ae0044d092874b
DLINK DAP-1620 A1 version 1.01 suffers from a directory traversal vulnerability.
afc86a4ac9803168c3b340a707e44de908ed61a99b24127201ce6cfc66f250d0
D-Link DIR-615 T1 version 20.10 suffers from a CAPTCHA bypass vulnerability.
927c998aba2229a5da7435240af1366b6fbea05d84f905742341817d7cb1ce24
D-Link DGS-1250 suffers from a header injection vulnerability that can be leveraged through cross site scripting.
7d7d9f8705c8fb7f26571e187596182c238f6573faea1c552faf5d97d4edd1f2
D-Link DIR-615 suffers from a privilege escalation vulnerability.
739965ed2e744b1a6d47c2b150242ff9854e69b0c3fd7984ca0db09f32514028
D-Link DI-524 version 2.06RU suffers from a cross site scripting vulnerability.
94a6f0876dbfb6cb3eb82db104d083f62cf4504bbc57680ce733218f87d09cfb
D-Link DIR-140L and DIR-640L suffer from an administrative credential disclosure vulnerability.
b26f91b5126499f96db63c1c08d745374df36ca7f8060dafe4f83f20296f194a
D-Link Dir-600M N150 suffers from a cross site scripting vulnerability.
444f11430a660b04c77652051691fc159b0b02f27a439acb64ed151f8e15d1ec
D-Link DIR-615 suffers from a denial of service vulnerability.
5f21c9888d28114b2be070abcc891f7a909bcb9c33b807d7d59fca9aa268cbd5
D-Link DIR-601 version 2.02NA suffers from a privilege escalation vulnerability.
33474835141701c30736e8087db9ef916d7adae2878081c9250a53fa48299500
D-Link DIR601 version 2.02 suffers from a credential disclosure vulnerability.
12427990fb2379d9872b15184c0de9bdb51b17f4dce37688d730c894ea754721
D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext.
c2f677dc653a79692726bbccff8050f283ad34e84c33c202f140624c41984b88
This is a simple proof of concept exploit for Drupal versions prior to 7.58 that demonstrate the drupalgeddon3 authenticated remote code execution vulnerability.
083d892c5eba86d29cd75e8b8e8af90103d767eb04a11f57033b9dd9088214a0
The D-Link DIR-615 wireless router suffers from a persistent cross site scripting vulnerability.
f4c40a832a09a04af44b0ccb912285554282dedc4dd3a2cd1278e1f3c3a96639
This is a simple perl script to perform dictionary attacks against the KeePass password manager.
6543608fbc7bd69c9aed01176048fc5dbb4c5cfcf6b3eb1751f46ee2b6e9c7cd
D-Link DIR-601 suffers from an administrative password disclosure vulnerability.
cf50539f5e3dfb67788edd38d8ba3c2387b46ed16ea384404df01adc959569b7
D-Link DIR-600M Wireless suffers from a cross site scripting vulnerability.
adf99c0508b54e86403d6e7ad9a41903776500729747a684c2ccc897c1e955a9
D-Link DGS-3000-10TC with firmware 2.00.006 suffers from a cross site request forgery vulnerability.
717fd8dd46edd9530a1410930e153f70e4c7a7782e591a4475ba5d12b792139c
D-Link DCS-936L suffers from a cross site request forgery vulnerability.
3251127ae5772aece5a596f9ae632c7495567ca8b9aa2dec93bb0433d7ca5898
D-Link DIR605L versions 2.08 and below suffer from a denial of service vulnerability via a simple HTTP GET.
5e2db716ffb704216a68d8836c2e2f0029bc36eef29b0931c8dc4c36e24af98b
D-Link DGS-3000-10TC suffers from cross site scripting and content spoofing vulnerabilities.
44e7a7ddaed08c5343bb3c5852a8c95a6b0749de85f90b518d5d021ae0e107c3
D-Link DIR-100 suffers from brute force and cross site request forgery vulnerabilities.
386fd93a4422b5c30c240c4eb2594da9d9779d096bf555c60db8d9a08d208dae
D-Link DIR-600M Wireless N 150 suffers from an authentication bypass vulnerability.
d2de4c1ec6d915ce30568940e60b15df8daef411482a245f56c00ebbe5c653ba
D-Link DIR-615 suffers from a cross site request forgery vulnerability.
f8915e5c7bacae0a5be94bb50488b379357c6226cc1624ae73cd16c7b3373923
D-Link DIR-615 suffers from cross site scripting and open redirection vulnerabilities. Hardware version E3 with firmware version 5.10 is affected.
a064b4156c0da33a3966fee4dfb137fa8926b8e38df505f768ebfd0be0ab208a