Buffer Overflow Vulnerability in D-Link Devices
CVE-2023-45580
9.8CRITICAL
Summary
A buffer overflow vulnerability exists in D-Link devices, specifically in the ddns.asp function. This vulnerability enables remote attackers to execute arbitrary code by manipulating parameters such as wild/mx. The affected devices include multiple models within the D-Link DI series, which may expose users to potential unauthorized access and control if not addressed promptly. Users are urged to review their device firmware and apply necessary patches to enhance security.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved