CVE-2024-38437
CRITICALDescription
D-Link - CWE-288:Authentication Bypass Using an Alternate Path or Channel
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| dlink | dsl-225_firmware |
| dlink | dsl-225 |
References
Frequently Asked Questions
What is CVE-2024-38437? +
How severe is CVE-2024-38437? +
What products are affected by CVE-2024-38437? +
How do I check if I'm vulnerable to CVE-2024-38437? +
Related Vulnerabilities
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the /api/public/user/login endpoint validates only the username and …
mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface …
Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain an exposed web management service …
This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API …
An improper authentication control vulnerability exists in AiCloud. This vulnerability can be triggered by a crafted request, potentially leading to …
In Teltonika Networks Remote Management System (RMS), it is possible to perform account pre-hijacking by misusing the invite functionality. If …