Buffer Overflow Vulnerability in D-Link DI Series Devices
CVE-2023-45576

9.8CRITICAL

Key Information:

Vendor
D-Link
Vendor
CVE Published:
16 October 2023

Summary

A buffer overflow vulnerability has been identified in several D-Link DI series devices, which could allow remote attackers to execute arbitrary code. This vulnerability is present in the upnp_ctrl.asp function, specifically through the remove_ext_proto/remove_ext_port parameters. Affected devices include multiple versions of the DI-7003GV2, DI-7100G+V2, DI-7100GV2, DI-7200G+V2, DI-7200GV2, DI-7300G+V2, and DI-7400G+V2, all prior to specified versions. Users are advised to review their device versions and apply necessary updates to mitigate potential attacks.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.