CVE-2024-9782

A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-619l_firmware:2.06:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*

History

16 Oct 2024, 16:44

Type Values Removed Values Added
First Time Dlink dir-619l Firmware
Dlink
Dlink dir-619l
Summary
  • (es) Se ha encontrado una vulnerabilidad en D-Link DIR-619L B1 2.06. Se ha declarado como crítica. Esta vulnerabilidad afecta a la función formEasySetupWWConfig del archivo /goform/formEasySetupWWConfig. La manipulación del argumento curTime provoca un desbordamiento del búfer. El ataque puede iniciarse de forma remota. El exploit se ha hecho público y puede utilizarse.
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formEasySetupWWConfig.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formEasySetupWWConfig.md - Exploit
References () https://vuldb.com/?ctiid.279934 - () https://vuldb.com/?ctiid.279934 - Permissions Required
References () https://vuldb.com/?id.279934 - () https://vuldb.com/?id.279934 - Third Party Advisory
References () https://vuldb.com/?submit.414549 - () https://vuldb.com/?submit.414549 - Third Party Advisory
References () https://www.dlink.com/ - () https://www.dlink.com/ - Product
CPE cpe:2.3:o:dlink:dir-619l_firmware:2.06:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*

10 Oct 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-10 12:15

Updated : 2024-10-16 16:44


NVD link : CVE-2024-9782

Mitre link : CVE-2024-9782

CVE.ORG link : CVE-2024-9782


JSON object : View

Products Affected

dlink

  • dir-619l_firmware
  • dir-619l
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')