D-Link DI-524 Wireless Router, DI-624 Wireless Router, and DI-784 allow remote attackers to cause a denial of service (device reboot) via a series of crafted fragmented UDP packets, possibly involving a missing fragment.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0188.html | Exploit Vendor Advisory |
http://secunia.com/advisories/18833 | Vendor Advisory |
http://www.securityfocus.com/bid/16621 | Vendor Advisory |
http://www.thunkers.net/~deft/advisories/dlink_udp_dos.txt | Exploit Vendor Advisory |
http://www.vupen.com/english/advisories/2006/0563 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24631 |
Configurations
Configuration 1 (hide)
|
History
26 Apr 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:d-link:di-524:*:*:*:*:*:*:*:* |
cpe:2.3:h:dlink:di-624:*:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-524:*:*:*:*:*:*:*:* |
Information
Published : 2005-12-31 05:00
Updated : 2024-02-04 16:52
NVD link : CVE-2005-4723
Mitre link : CVE-2005-4723
CVE.ORG link : CVE-2005-4723
JSON object : View
Products Affected
dlink
- di-624
- di-524
d-link
- di-524
- di-784
CWE