A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. This issue affects the function formWlanSetup_Wizard of the file /goform/formWlanSetup_Wizard. The manipulation of the argument webpage leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
لینک | منبع | تگ ها |
---|---|---|
https://vuldb.com/?ctiid.279371 | Permissions Required | |
https://vuldb.com/?submit.413922 | Third Party Advisory | |
https://www.dlink.com/ | Product | |
https://vuldb.com/?id.279371 | Third Party Advisory | |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formWlanSetup_Wizard.md | Exploit Third Party Advisory |