In D-Link DIR-860L v2.03, there is a buffer overflow vulnerability due to the lack of length verification for the SID field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
History

Tue, 20 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-860l Firmware
CPEs cpe:2.3:a:dlink:dir-860l_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-860l Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
Description In D-Link DIR-860L v2.03, there is a buffer overflow vulnerability due to the lack of length verification for the SID field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-08-19T00:00:00

Updated: 2024-08-20T14:27:04.537Z

Reserved: 2024-08-05T00:00:00

Link: CVE-2024-42812

cve-icon Vulnrichment

Updated: 2024-08-20T14:26:50.870Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-19T20:15:07.070

Modified: 2024-08-20T15:44:20.567

Link: CVE-2024-42812

cve-icon Redhat

No data.