Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dsl-6641k |
|
| Vendors & Products |
D-link
D-link dsl-6641k |
Mon, 02 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in D-Link DSL-6641K N8.TR069.20131126. Affected by this issue is the function ad_virtual_server_vdsl of the component Web Interface. Performing a manipulation of the argument Name results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. | |
| Title | D-Link DSL-6641K Web ad_virtual_server_vdsl cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T09:11:22.430Z
Reserved: 2026-01-30T15:48:31.407Z
Link: CVE-2026-1705
Updated: 2026-02-02T17:41:19.435Z
Status : Deferred
Published: 2026-01-30T22:15:55.950
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-1705
No data.
OpenCVE Enrichment
Updated: 2026-04-18T01:15:05Z