All 43 CVE vulnerabilities found in DNS-120, with AI-generated Chinese analysis, references, and POCs.
This page provides a comprehensive vulnerability aggregation for the DNS-120 product, focusing on Common Weakness Enumeration (CWE) classifications and associated security tags. It collects a wide spectrum of known security flaws affecting this device, including but not limited to remote code execution, privilege escalation, cross-site scripting, and information disclosure vulnerabilities. The data covers a broad historical time range, capturing both recent critical findings and legacy issues that may still impact deployed systems. Visitors can utilize this resource to track vendor advisories from the manufacturer, gaining insights into how the developer responds to security reports and patches known defects over time. Additionally, users can gain a deeper understanding of specific weakness classes by observing their prevalence and context within the DNS-120 environment, helping to contextualize the risk of these flaws against industry benchmarks. Furthermore, the page serves as a detailed lookup tool for the product's vulnerability history, allowing security professionals to audit past incidents and assess the overall security posture of the device. This structured approach facilitates better risk management by providing a clear timeline of exposure and remediation efforts. By centralizing this information, the page supports informed decision-making for administrators and security analysts who need to prioritize mitigation strategies based on historical trends and current threat intelligence. The goal is to offer a transparent view of the product’s security landscape without overwhelming the reader with unstructured data.
Vendor: D-Link
All 43 known CVE vulnerabilities affecting DNS-120 with full Chinese analysis, references, and POCs where available.