Buffer Overflow Vulnerability in DIR-619L B1 2.06 Could Lead to Remote Exploitation
CVE-2024-9909
8.8HIGH
Key Information:
- Vendor
- D-link
- Status
- Vendor
- CVE Published:
- 13 October 2024
Badges
πΎ Exploit Existsπ‘ Public PoC
Summary
A vulnerability has been identified in the D-Link DIR-619L B1 router, specifically affecting the formSetMuti function located in the /goform/formSetMuti file. The issue arises when the curTime argument is manipulated, which can lead to a buffer overflow condition. This vulnerability allows remote attackers to potentially execute arbitrary code. Public awareness of the exploit has been raised, indicating the possibility of exploitation in the wild.
Affected Version(s)
DIR-619L B1 2.06
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
wxhwxhwxh_mie (VulDB User)