A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
History

Wed, 09 Oct 2024 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink dir-605l
CPEs cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
Vendors & Products Dlink dir-605l

Mon, 07 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-605l Firmware
CPEs cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-605l Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 05 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title D-Link DIR-605L formEasySetupWWConfig buffer overflow
Weaknesses CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-05T14:00:06.607Z

Updated: 2024-10-07T13:50:04.793Z

Reserved: 2024-10-04T17:26:56.148Z

Link: CVE-2024-9535

cve-icon Vulnrichment

Updated: 2024-10-07T13:48:13.949Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-05T14:15:04.630

Modified: 2024-10-09T11:16:35.487

Link: CVE-2024-9535

cve-icon Redhat

No data.