D-Link DSL-3782 EU v1.01:EU v1.03 is affected by a buffer overflow which can cause a denial of service. This vulnerability exists in the web interface "/cgi-bin/New_GUI/Igmp.asp". Authenticated remote attackers can trigger this vulnerability by sending a long string in parameter 'igmpsnoopEnable' via an HTTP request.
References
Link | Resource |
---|---|
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10245 | Patch Vendor Advisory |
https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10245 | Patch Vendor Advisory |
https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10245 - Patch, Vendor Advisory | |
References | () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory |
Information
Published : 2021-09-09 17:15
Updated : 2024-11-21 06:23
NVD link : CVE-2021-40284
Mitre link : CVE-2021-40284
CVE.ORG link : CVE-2021-40284
JSON object : View
Products Affected
dlink
- dsl-3782_firmware
- dsl-3782
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')