Het mariniersdetachement Sint Maarten wordt momenteel ingezet bij de gevangenis op het eiland. Dat gebeurt op verzoek van het Korps Politie Sint Maarten. In de gevangenis brak gisteren brand uit.
A vulnerability classified as critical was found in D-Link DIR-X3260. Affected by this vulnerability is the function SOAPAction of the file prog.cgi. The manipulation leads to command injection.
This vulnerability is known as CVE-2023-35723. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in D-Link DIR-3040. It has been rated as critical. This issue affects the function SetUsersSettings of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-41228. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in D-Link DIR-3040. Affected is the function SetTriggerPPPoEValidate of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2023-41227. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in D-Link DIR-3040. Affected by this vulnerability is the function SetMyDLinkRegistration of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2023-41226. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in D-Link DIR-3040. Affected by this issue is the function SetIPv6PppoeSettings of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2023-41225. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in D-Link DIR-3040. This affects the function SetDeviceSettings of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2023-41224. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in D-Link DIR-3040 and classified as critical. This vulnerability affects the function SetQuickVPNSettings of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2023-41223. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in D-Link DIR-3040 and classified as critical. This issue affects the function SetWan2Settings of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2023-41222. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in D-Link DIR-3040. It has been classified as critical. Affected is the function SetWLanRadioSecurity of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2023-41221. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in D-Link DIR-3040. It has been declared as critical. Affected by this vulnerability is the function SetSysEmailSettings of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2023-41220. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in D-Link DIR-3040. It has been rated as critical. Affected by this issue is the function SetWanSettings of the file prog.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2023-41219. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.