Buffer Overflow Issue in D-Link Networking Devices
CVE-2023-45572
9.8CRITICAL
Summary
A buffer overflow vulnerability has been identified in several D-Link networking devices, specifically within the tgfile.htm function. This vulnerability may allow a remote attacker to execute arbitrary code, potentially compromising the integrity of the device. Affected devices include various models such as DI-7003GV2, DI-7100G+V2, DI-7200G+V2, and others, all of which are susceptible to exploitation if not patched. Users are advised to update their devices to the latest versions to mitigate this risk.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved