A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. Affected by this issue is the function formSetEasy_Wizard of the file /goform/formSetEasy_Wizard. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
History

Tue, 08 Oct 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink dir-605l
CPEs cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
Vendors & Products Dlink dir-605l

Mon, 07 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-605l Firmware
CPEs cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-605l Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 06 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. Affected by this issue is the function formSetEasy_Wizard of the file /goform/formSetEasy_Wizard. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Title D-Link DIR-605L formSetEasy_Wizard buffer overflow
Weaknesses CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-06T14:31:05.253Z

Updated: 2024-10-07T13:49:28.237Z

Reserved: 2024-10-05T17:00:52.351Z

Link: CVE-2024-9555

cve-icon Vulnrichment

Updated: 2024-10-07T13:48:02.947Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-06T15:15:11.353

Modified: 2024-10-08T18:36:39.123

Link: CVE-2024-9555

cve-icon Redhat

No data.