CVE-2024-9556

A vulnerability, which was classified as critical, was found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetEnableWizard of the file /goform/formSetEnableWizard. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*

History

08 Oct 2024, 18:37

Type Values Removed Values Added
First Time Dlink dir-605l Firmware
Dlink
Dlink dir-605l
CPE cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Summary
  • (es) En D-Link DIR-605L 2.13B01 BETA se ha detectado una vulnerabilidad clasificada como crítica que afecta a la función formSetEnableWizard del archivo /goform/formSetEnableWizard. La manipulación del argumento curTime provoca un desbordamiento del búfer. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetEnableWizard.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetEnableWizard.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.279363 - () https://vuldb.com/?ctiid.279363 - Permissions Required
References () https://vuldb.com/?id.279363 - () https://vuldb.com/?id.279363 - Third Party Advisory
References () https://vuldb.com/?submit.413915 - () https://vuldb.com/?submit.413915 - Third Party Advisory
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product

06 Oct 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-06 16:15

Updated : 2024-10-08 18:37


NVD link : CVE-2024-9556

Mitre link : CVE-2024-9556

CVE.ORG link : CVE-2024-9556


JSON object : View

Products Affected

dlink

  • dir-605l_firmware
  • dir-605l
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')