CVE-2024-9557

A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This vulnerability affects the function formSetWanPPPoE of the file /goform/formSetWanPPPoE. The manipulation of the argument webpage leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*

History

08 Oct 2024, 18:37

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en D-Link DIR-605L 2.13B01 BETA y se ha clasificado como crítica. Esta vulnerabilidad afecta a la función formSetWanPPPoE del archivo /goform/formSetWanPPPoE. La manipulación del argumento webpage provoca un desbordamiento del búfer. El ataque puede iniciarse de forma remota. El exploit se ha hecho público y puede utilizarse.
First Time Dlink dir-605l Firmware
Dlink
Dlink dir-605l
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWanPPPoE.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWanPPPoE.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.279364 - () https://vuldb.com/?ctiid.279364 - Permissions Required
References () https://vuldb.com/?id.279364 - () https://vuldb.com/?id.279364 - Third Party Advisory
References () https://vuldb.com/?submit.413916 - () https://vuldb.com/?submit.413916 - Third Party Advisory
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
CPE cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*

06 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-06 17:15

Updated : 2024-10-08 18:37


NVD link : CVE-2024-9557

Mitre link : CVE-2024-9557

CVE.ORG link : CVE-2024-9557


JSON object : View

Products Affected

dlink

  • dir-605l_firmware
  • dir-605l
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')