A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. This issue affects the function formWlanSetup_Wizard of the file /goform/formWlanSetup_Wizard. The manipulation of the argument webpage leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Access Vector | Network |
Access Complexity | Low |
Authentication | Single |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Vulnerability Complexity | High |
Vulnerability Impact | High |
Epss Score | 0.00063 |
---|---|
Epss Percentile | 0.29872 |
ریسک پائین:: این آسیب پذیری احتمال ارائه Exploit پائینی دارد. به روز رسانی و نظارت معمولی را لحاظ نمائید.
CPE | Vendor | Product | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:* | dlink | dir-605l_firmware | 2.13b01 | * |
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:* | dlink | dir-605l | - | * |
لینک | منبع | تگ ها |
---|---|---|
https://vuldb.com/?ctiid.279371 | Permissions Required | |
https://vuldb.com/?submit.413922 | Third Party Advisory | |
https://www.dlink.com/ | Product | |
https://vuldb.com/?id.279371 | Third Party Advisory | |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formWlanSetup_Wizard.md | Exploit Third Party Advisory |