A vulnerability classified as critical was found in D-Link DIR-605L 2.13B01 BETA. This vulnerability affects the function formSetWizard1/formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Access Vector | Network |
Access Complexity | Low |
Authentication | Single |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Vulnerability Complexity | High |
Vulnerability Impact | High |
Epss Score | 0.00063 |
---|---|
Epss Percentile | 0.29872 |
ریسک پائین:: این آسیب پذیری احتمال ارائه Exploit پائینی دارد. به روز رسانی و نظارت معمولی را لحاظ نمائید.
CPE | Vendor | Product | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:* | dlink | dir-605l_firmware | 2.13b01 | * |
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:* | dlink | dir-605l_firmware | 2.13b01 | * |
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:* | dlink | dir-605l | - | * |
لینک | منبع | تگ ها |
---|---|---|
https://vuldb.com/?submit.413921 | Third Party Advisory | |
https://vuldb.com/?id.279370 | Third Party Advisory | |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWizard.md | Exploit Third Party Advisory | |
https://www.dlink.com/ | Product | |
https://vuldb.com/?ctiid.279370 | Permissions Required |