CVE-2024-9551

A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formSetWanL2TP of the file /goform/formSetWanL2TP. The manipulation of the argument webpage leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*

History

09 Oct 2024, 11:15

Type Values Removed Values Added
CPE cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Summary
  • (es) Se ha encontrado una vulnerabilidad en D-Link DIR-605L 2.13B01 BETA. Se ha declarado como crítica. Esta vulnerabilidad afecta a la función formSetWanL2TP del archivo /goform/formSetWanL2TP. La manipulación del argumento webpage provoca un desbordamiento del búfer. El ataque se puede ejecutar de forma remota. El exploit se ha hecho público y puede utilizarse.
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWanL2TP.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWanL2TP.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.279349 - () https://vuldb.com/?ctiid.279349 - Permissions Required
References () https://vuldb.com/?id.279349 - () https://vuldb.com/?id.279349 - Third Party Advisory
References () https://vuldb.com/?submit.413910 - () https://vuldb.com/?submit.413910 - Third Party Advisory
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
First Time Dlink dir-605l Firmware
Dlink
Dlink dir-605l

06 Oct 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-06 10:15

Updated : 2024-10-09 11:15


NVD link : CVE-2024-9551

Mitre link : CVE-2024-9551

CVE.ORG link : CVE-2024-9551


JSON object : View

Products Affected

dlink

  • dir-605l_firmware
  • dir-605l
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')