{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:12:09.662","vulnerabilities":[{"cve":{"id":"CVE-2021-28838","sourceIdentifier":"cve@mitre.org","published":"2021-08-10T18:15:07.137","lastModified":"2024-11-21T06:00:18.183","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Null pointer dereference vulnerability in D-Link DAP-2310 2,10RC039, DAP-2330 1.10RC036 BETA, DAP-2360 2.10RC055, DAP-2553 3.10rc039 BETA, DAP-2660 1.15rc131b, DAP-2690 3.20RC115 BETA, DAP-2695 1.20RC093, DAP-3320 1.05RC027 BETA and DAP-3662 1.05rc069 in the sbin/httpd binary. The crash happens at the `atoi' operation when a specific network package are sent to the httpd binary."},{"lang":"es","value":"Una vulnerabilidad de Desreferencia de Puntero Null en D-Link DAP-2310 versión 2,10RC039, DAP-2330 versión 1.10RC036 BETA, DAP-2360 versión 2.10RC055, DAP-2553 versión 3.10rc039 BETA, DAP-2660 versión 1. 15rc131b, DAP-2690 versión 3.20RC115 BETA, DAP-2695 versión 1.20RC093, DAP-3320 versión 1.05RC027 BETA y DAP-3662 versión 1.05rc069, en el binario sbin/httpd. El bloqueo se produce en la operación \"atoi\" cuando es enviado un paquete de red específico al binario httpd"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2310_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.10rc039","matchCriteriaId":"C766E14A-1A33-4C16-9418-A5C39A465FB7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2310:-:*:*:*:*:*:*:*","matchCriteriaId":"8C5F3D97-3CFE-41B9-9C8B-832445EA92B0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2330_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.10rc036","matchCriteriaId":"0093577A-58C8-46A2-AC77-13A962B9E79C"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2330_firmware:1.10rc036:beta:*:*:*:*:*:*","matchCriteriaId":"D75CB7C3-2FEA-4958-A9E5-D00BBDB13EF7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2330:-:*:*:*:*:*:*:*","matchCriteriaId":"9ABC8839-D62A-4AAB-A9D2-AFE95CBB9B17"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2360_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.10rc055","matchCriteriaId":"2A9FE101-CEEC-4628-9841-8BF2CF2C2E53"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2360:-:*:*:*:*:*:*:*","matchCriteriaId":"E7AE9A88-AD97-41A5-9847-4282788EBB1E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2553_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.10rc039","matchCriteriaId":"82278F9A-0167-4AA2-9205-E896BCAF9DF8"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2553_firmware:3.10rc039:beta:*:*:*:*:*:*","matchCriteriaId":"1389EADA-A252-4F88-8D62-0232397620F9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2553:-:*:*:*:*:*:*:*","matchCriteriaId":"20BA9382-B0D4-4E7C-A198-067AA65AB190"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2660_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.15rc131b","matchCriteriaId":"6757587C-3A7C-4D1B-8DAC-42638F5B2D81"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2660:-:*:*:*:*:*:*:*","matchCriteriaId":"41EFE653-296E-4E37-9DCC-BAF99C4AD2F3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2690_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.20rc115","matchCriteriaId":"B86790E9-832E-47EA-9875-1E4CE367C91E"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2690_firmware:3.20rc115:beta:*:*:*:*:*:*","matchCriteriaId":"D949F1F7-C157-44E5-9F16-527E2891706F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2690:-:*:*:*:*:*:*:*","matchCriteriaId":"3B827A81-49A8-4AFD-943A-3F359615E49D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2695_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.20rc093","matchCriteriaId":"FF585CC2-FE67-468B-AED9-2577219BD423"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2695:-:*:*:*:*:*:*:*","matchCriteriaId":"9039DA66-D624-4590-B236-101B775C5956"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-3320_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.05rc027","matchCriteriaId":"7D790C29-76BD-42E9-A60D-8E734AF60E8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-3320_firmware:1.05rc027:beta:*:*:*:*:*:*","matchCriteriaId":"CDD601D1-0B67-4884-8A03-F7766568685E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-3320:-:*:*:*:*:*:*:*","matchCriteriaId":"95D03B33-E8D6-4ED3-AED3-8FBDE80C74CB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-3662_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.05rc069","matchCriteriaId":"8C136448-905B-4614-837C-FB5D021E02A5"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-3662_firmware:1.05rc069:beta:*:*:*:*:*:*","matchCriteriaId":"A8E565BE-C308-4CDE-A2CA-AA1EE184C062"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-3662:-:*:*:*:*:*:*:*","matchCriteriaId":"07645866-3B61-46AB-85C6-ED86F1B0D47F"}]}]}],"references":[{"url":"https://github.com/zyw-200/EQUAFL/blob/main/dlink-email-cve.pdf","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/zyw-200/EQUAFL/blob/main/dlink-email-cve2.pdf","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.dlink.com/en/security-bulletin/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://github.com/zyw-200/EQUAFL/blob/main/dlink-email-cve.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/zyw-200/EQUAFL/blob/main/dlink-email-cve2.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.dlink.com/en/security-bulletin/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}