Buffer Overflow Vulnerability in DLINK 619L Router
CVE-2020-19320
9.8CRITICAL
Summary
A buffer overflow vulnerability has been identified in the DLINK 619L router. This issue arises from improper handling of the 'curTime' parameter during the login process. Exploiting this vulnerability could allow an attacker to execute arbitrary code on the affected device, compromising its security and potentially leading to unauthorized access. Users are urged to apply necessary updates and security patches to mitigate this risk. For further details, refer to the official security bulletin and community discussions on GitHub.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database