cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-52755,https://securityvulnerability.io/vulnerability/CVE-2024-52755,Buffer Overflow Vulnerability in D-LINK DI-8003,D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the host_ip parameter in the ipsec_road_asp function.,D-LINK,Di-8003 Firmware,4.9,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-11-21T09:46:00.000Z,0 CVE-2024-52757,https://securityvulnerability.io/vulnerability/CVE-2024-52757,,D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the notify parameter in the arp_sys_asp function.,D-Link,Di-8003 Firmware,4.9,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-11-20T20:15:00.000Z,0 CVE-2024-52754,https://securityvulnerability.io/vulnerability/CVE-2024-52754,,D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function.,D-Link,Di-8003 Firmware,4.9,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-11-20T20:15:00.000Z,0 CVE-2024-52759,https://securityvulnerability.io/vulnerability/CVE-2024-52759,Buffer Overflow Vulnerability in D-LINK DI-8003 Router,"The D-LINK DI-8003 router is affected by a buffer overflow vulnerability originating from improper handling of the 'ip' parameter in the ip_position_asp function. This vulnerability allows attackers to potentially execute arbitrary code, leading to unauthorized access or manipulation of the device. Users are advised to evaluate their device firmware and apply the necessary security patches as recommended by the vendor to mitigate risks associated with this vulnerability.",D-Link,Di-8003 Firmware,9.8,CRITICAL,0.0010000000474974513,false,false,false,false,,false,false,2024-11-19T19:15:00.000Z,0 CVE-2024-11048,https://securityvulnerability.io/vulnerability/CVE-2024-11048,Buffer Overflow Vulnerability in D-Link DI-8003 Router,"A critical buffer overflow vulnerability has been identified in the D-Link DI-8003 router, specifically within the dbsrv_asp function of the /dbsrv.asp file. This security flaw allows attackers to manipulate the 'str' argument, potentially leading to a stack-based buffer overflow. This remote exploit can be initiated without authentication, thereby posing a significant risk to users. The vulnerability has been publicly disclosed, making both the product and its users vulnerable to active exploitation. Immediate action is advised to protect against this significant security threat.",D-link,Di-8003,9.8,CRITICAL,0.0008699999889358878,false,false,false,true,true,false,false,2024-11-10T04:00:10.367Z,0 CVE-2024-11047,https://securityvulnerability.io/vulnerability/CVE-2024-11047,Stack Buffer Overflow Vulnerability in D-Link DI-8003 Router,"The D-Link DI-8003 router, specifically firmware version 16.07.16A1, contains a critical vulnerability involving a stack-based buffer overflow in the upgrade_filter_asp function located in the /upgrade_filter.asp file. This vulnerability is triggered through improper handling of the 'path' argument, which can be exploited by remote attackers to execute arbitrary code or cause denial-of-service conditions. The vulnerability is publicly disclosed and poses significant risks due to its remote exploitability, underscoring the need for immediate attention and remediation by affected users.",D-link,Di-8003,9.8,CRITICAL,0.0008699999889358878,false,false,false,true,true,false,false,2024-11-10T03:31:04.900Z,0 CVE-2024-11046,https://securityvulnerability.io/vulnerability/CVE-2024-11046,Command Injection Vulnerability in D-Link DI-8003 Router,"A serious command injection vulnerability has been identified in the D-Link DI-8003 router, specifically within the upgrade_filter_asp function found in the /upgrade_filter.asp file. By manipulating the 'path' argument, an attacker can potentially execute arbitrary operating system commands remotely. This security flaw exposes the device to significant security risks, making it crucial for users to address this vulnerability promptly. Publicly disclosed exploit techniques highlight the urgency of patching affected D-Link products to prevent unauthorized access and data breaches.",D-link,Di-8003,9.8,CRITICAL,0.0008900000248104334,false,false,false,true,true,false,false,2024-11-10T03:00:10.737Z,0