CVE-2024-9568

A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formAdvNetwork of the file /goform/formAdvNetwork. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:*

History

09 Oct 2024, 13:04

Type Values Removed Values Added
CPE cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*
First Time Dlink dir-619l
Dlink dir-619l Firmware
Dlink
Summary
  • (es) En D-Link DIR-619L B1 2.06 se ha detectado una vulnerabilidad clasificada como crítica. La función formAdvNetwork del archivo /goform/formAdvNetwork está afectada. La manipulación del argumento curTime provoca un desbordamiento del búfer. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse.
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formAdvNetwork.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formAdvNetwork.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.279462 - () https://vuldb.com/?ctiid.279462 - Permissions Required
References () https://vuldb.com/?id.279462 - () https://vuldb.com/?id.279462 - Third Party Advisory
References () https://vuldb.com/?submit.414545 - () https://vuldb.com/?submit.414545 - Third Party Advisory
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product

07 Oct 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-07 15:15

Updated : 2024-10-09 13:04


NVD link : CVE-2024-9568

Mitre link : CVE-2024-9568

CVE.ORG link : CVE-2024-9568


JSON object : View

Products Affected

dlink

  • dir-619l
  • dir-619l_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')