Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wild/mx and other parameters of the ddns.asp function
References
Link | Resource |
---|---|
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug6.md | Exploit Third Party Advisory |
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug6.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug6.md - Exploit, Third Party Advisory |
19 Oct 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wild/mx and other parameters of the ddns.asp function |
19 Oct 2023, 17:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-7300g\+:v2.d1:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-7200g\+:v2.d1:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-7100g\+:v2.d1:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7300g\+_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:* cpe:2.3:h:dlink:di-7400g\+:v2.d1:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7200g\+_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7100g\+_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7400g\+_firmware:*:*:*:*:*:*:*:* |
|
First Time |
Dlink di-7200g
Dlink di-7003g Firmware Dlink di-7200g\+ Dlink di-7100g Firmware Dlink di-7300g\+ Dlink di-7400g\+ Firmware Dlink di-7200g\+ Firmware Dlink di-7100g\+ Dlink di-7003g Dlink Dlink di-7100g Dlink di-7300g\+ Firmware Dlink di-7400g\+ Dlink di-7100g\+ Firmware Dlink di-7200g Firmware |
|
References | (MISC) https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug6.md - Exploit, Third Party Advisory | |
CWE | CWE-787 |
16 Oct 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-16 07:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45580
Mitre link : CVE-2023-45580
CVE.ORG link : CVE-2023-45580
JSON object : View
Products Affected
dlink
- di-7100g
- di-7300g\+
- di-7100g\+
- di-7003g
- di-7200g\+
- di-7100g_firmware
- di-7003g_firmware
- di-7400g\+
- di-7200g\+_firmware
- di-7300g\+_firmware
- di-7400g\+_firmware
- di-7200g_firmware
- di-7100g\+_firmware
- di-7200g
CWE
CWE-787
Out-of-bounds Write