Логотип exploitDog
bind:CVE-2026-1685
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1685

Количество 3

Количество 3

nvd логотип

CVE-2026-1685

10 дней назад

A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-4h4g-2r65-5v68

10 дней назад

A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.

CVSS3: 3.7
EPSS: Низкий
fstec логотип

BDU:2026-01122

24 дня назад

Уязвимость функции sub_40AC74() микропрограммного обеспечения маршрутизаторов D-link DIR-823X, позволяющая нарушителю реализовать атаку методом «грубой силы» (brute force)

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-1685

A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.

CVSS3: 3.7
0%
Низкий
10 дней назад
github логотип
GHSA-4h4g-2r65-5v68

A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.

CVSS3: 3.7
0%
Низкий
10 дней назад
fstec логотип
BDU:2026-01122

Уязвимость функции sub_40AC74() микропрограммного обеспечения маршрутизаторов D-link DIR-823X, позволяющая нарушителю реализовать атаку методом «грубой силы» (brute force)

CVSS3: 3.7
0%
Низкий
24 дня назад

Уязвимостей на страницу