Buffer Overflow Vulnerability in D-Link's DIR-605L 2.13B01 BETA
CVE-2024-9534
Key Information:
Badges
Summary
A vulnerability exists in the D-Link DIR-605L router that allows for remote exploitation via a buffer overflow in the formEasySetPassword function located within the /goform directory. By manipulating the curTime argument, attackers can potentially execute arbitrary code on the device. This vulnerability could lead to severe security implications as it exposes the router to unauthorized access. The exploit has been publicly disclosed, emphasizing the importance of prompt remediation.
Affected Version(s)
DIR-605L 2.13B01 BETA
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved