CVE-2024-9562

A vulnerability classified as critical was found in D-Link DIR-605L 2.13B01 BETA. This vulnerability affects the function formSetWizard1/formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*

History

08 Oct 2024, 18:38

Type Values Removed Values Added
First Time Dlink
Dlink dir-605l Firmware
Dlink dir-605l
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWizard.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWizard.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.279370 - () https://vuldb.com/?ctiid.279370 - Permissions Required
References () https://vuldb.com/?id.279370 - () https://vuldb.com/?id.279370 - Third Party Advisory
References () https://vuldb.com/?submit.413921 - () https://vuldb.com/?submit.413921 - Third Party Advisory
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como crítica en D-Link DIR-605L 2.13B01 BETA. Esta vulnerabilidad afecta a la función formSetWizard1/formSetWizard2. La manipulación del argumento curTime provoca un desbordamiento del búfer. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse.
CPE cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*

06 Oct 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-06 23:15

Updated : 2024-10-08 18:38


NVD link : CVE-2024-9562

Mitre link : CVE-2024-9562

CVE.ORG link : CVE-2024-9562


JSON object : View

Products Affected

dlink

  • dir-605l
  • dir-605l_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')