Required CVE Record Information
Description
A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This vulnerability affects the function formSetWanPPPoE of the file /goform/formSetWanPPPoE. The manipulation of the argument webpage leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS 4 Total
Score | Severity | Version | Vector String |
---|---|---|---|
8.7 | HIGH | 4.0 | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
8.8 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
8.8 | HIGH | 3.0 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
9.0 | — | 2.0 | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Credits
- yhryhryhr_miemie (VulDB User) reporter
References 5 Total
- vuldb.com: VDB-279364 | D-Link DIR-605L formSetWanPPPoE buffer overflow vdb-entrytechnical-description
- vuldb.com: VDB-279364 | CTI Indicators (IOB, IOC, IOA) signaturepermissions-required
- vuldb.com: Submit #413916 | D-Link DIR-605L 2.13B01 BETA Buffer Overflow third-party-advisory
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWanPPPoE.md exploit
- https://www.dlink.com/ product