Buffer Overflow Vulnerability in D-Link Devices
CVE-2023-45579
9.8CRITICAL
Summary
A buffer overflow vulnerability exists in various D-Link devices that allows a remote attacker to execute arbitrary code. This vulnerability is triggered via the 'ip/type' parameter in the 'jingx.asp' function. Affected devices include DI-7003GV2.D1, DI-7100G+V2.D1, DI-7100GV2.D1, DI-7200G+V2.D1, DI-7200GV2.E1, DI-7300G+V2.D1, and DI-7400G+V2.D1 that have not been updated to their latest firmware versions.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved