cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-9915,https://securityvulnerability.io/vulnerability/CVE-2024-9915,Buffer Overflow Vulnerability in D-Link Router Software,"A serious buffer overflow vulnerability has been identified in the D-Link DIR-619L B1 router, specifically in the formVirtualServ function located in the /goform/formVirtualServ file. This flaw arises from improper handling of the curTime argument, allowing attackers to exploit the vulnerability remotely. The risk of exploitation is elevated due to the public disclosure of this vulnerability, and it could lead to unauthorized access or control over the affected device. Users and administrators are strongly encouraged to review security recommendations provided by D-Link and update their firmware to mitigate this critical security risk.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T18:31:04.848Z,0 CVE-2024-9914,https://securityvulnerability.io/vulnerability/CVE-2024-9914,Buffer Overflow Vulnerability in D-Link DIR-619L B1 2.06 Allows Remote Attack,"A buffer overflow vulnerability exists in the D-Link DIR-619L router's function formSetWizardSelectMode. This security flaw arises from improper handling of the curTime argument within the specified file, /goform/formSetWizardSelectMode. It allows attackers to exploit the buffer overflow remotely, potentially compromising the device's functionality and security. The exploit, which has been publicly disclosed, poses a significant risk to users of the affected D-Link DIR-619L model.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T18:00:06.971Z,0 CVE-2024-9913,https://securityvulnerability.io/vulnerability/CVE-2024-9913,Buffer Overflow Vulnerability in D-Link DIR-619L B1 2.06,"A security vulnerability has been identified in the D-Link DIR-619L B1 router, specifically in the formSetRoute function located in the /goform/formSetRoute file. The issue arises from inadequate input validation leading to a buffer overflow situation. An attacker can remotely manipulate the 'curTime' argument to exploit this flaw, which may compromise the device's integrity and security. The vulnerability has been publicly disclosed, rendering affected routers susceptible to potential attacks that could exploit this weakness.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T17:31:04.724Z,0 CVE-2024-9912,https://securityvulnerability.io/vulnerability/CVE-2024-9912,Buffer Overflow Vulnerability in D-Link DIR-619L B1 2.06,"A recently identified vulnerability in the D-Link DIR-619L B1 version 2.06 resides in the formSetQoS function within the file /goform/formSetQoS. This vulnerability allows for a buffer overflow through improper argument handling of the curTime parameter. The flaw can be exploited remotely, facilitating unauthorized access and potential manipulation of network settings. This publicly disclosed vulnerability poses a significant risk for users of this router, making it essential for affected individuals to implement remedial measures promptly.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T16:31:05.117Z,0 CVE-2024-9911,https://securityvulnerability.io/vulnerability/CVE-2024-9911,Buffer Overflow Vulnerability in D-Link DIR-619L B1 2.06 Could Allow Remote Exploitation,"A severe buffer overflow vulnerability exists in the D-Link DIR-619L B1 version 2.06, specifically within the formSetPortTr function located in the /goform/formSetPortTr file. An attacker can exploit this weakness by manipulating the curTime argument, which may result in unauthorized access and allow for potential remote attacks. The exploit has been publicly disclosed, heightening the security risk for users of this device. Mitigation strategies are highly recommended to safeguard against such vulnerabilities.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T16:00:07.222Z,0 CVE-2024-9910,https://securityvulnerability.io/vulnerability/CVE-2024-9910,Buffer Overflow Vulnerability in D-Link DIR-619L B1 2.06,"A vulnerability has been identified in the D-Link DIR-619L B1 router's firmware version 2.06 related to the function formSetPassword found in the file /goform/formSetPassword. The manipulation of the curTime argument can lead to a buffer overflow condition. This security flaw allows an attacker to execute a remote exploit, potentially compromising the device's integrity and security. The exploit has been publicly disclosed, which raises the urgency for affected users to apply necessary security measures.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T14:31:04.973Z,0 CVE-2024-9909,https://securityvulnerability.io/vulnerability/CVE-2024-9909,Buffer Overflow Vulnerability in DIR-619L B1 2.06 Could Lead to Remote Exploitation,"A vulnerability has been identified in the D-Link DIR-619L B1 router, specifically affecting the formSetMuti function located in the /goform/formSetMuti file. The issue arises when the curTime argument is manipulated, which can lead to a buffer overflow condition. This vulnerability allows remote attackers to potentially execute arbitrary code. Public awareness of the exploit has been raised, indicating the possibility of exploitation in the wild.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T14:00:07.160Z,0 CVE-2024-9908,https://securityvulnerability.io/vulnerability/CVE-2024-9908,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"A significant buffer overflow vulnerability has been identified in the D-Link DIR-619L B1 router, specifically within the formSetMACFilter function located at /goform/formSetMACFilter. This security flaw occurs due to improper handling of the 'curTime' argument, which could allow an attacker to exploit this weakness and execute arbitrary code or disrupt router functionality. Public disclosure of this vulnerability has raised concerns, urging users to take immediate action to secure their devices. It is crucial for users of the affected D-Link DIR-619L B1 version 2.06 to apply security updates and mitigate potential risks associated with this vulnerability.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-13T12:00:06.936Z,0 CVE-2024-9786,https://securityvulnerability.io/vulnerability/CVE-2024-9786,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"A serious buffer overflow vulnerability exists in the D-Link DIR-619L B1 router, specifically within the formSetLog function found in the /goform/formSetLog file. This issue arises from improper handling of the 'curTime' argument, which can lead to a buffer overflow condition. An attacker can exploit this vulnerability remotely, potentially leading to unauthorized access or control over the device. Given that this exploit has been publicly disclosed, it poses an urgent security risk to users of this router. It is recommended that users immediately apply the latest firmware updates to mitigate this vulnerability.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-10T13:00:10.763Z,0 CVE-2024-9785,https://securityvulnerability.io/vulnerability/CVE-2024-9785,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"Recently disclosed, a serious buffer overflow vulnerability exists within the D-Link DIR-619L B1 router, specifically in the formSetDDNS function located in the /goform/formSetDDNS file. This vulnerability arises when the 'curTime' argument is manipulated, allowing an attacker to execute unauthorized remote commands. Due to its nature, the exploit can be triggered without authentication, enabling malicious actors to compromise the affected device. Users are strongly advised to review system configurations and apply security patches to mitigate potential risks associated with unauthorized access and control over the router.",D-link,Dir-619l B1,8.8,HIGH,0.001990000018849969,false,false,false,true,true,false,false,2024-10-10T13:00:08.123Z,0 CVE-2024-9784,https://securityvulnerability.io/vulnerability/CVE-2024-9784,Buffer Overflow in D-Link DIR-619L B1 Router,"A severe buffer overflow vulnerability has been identified in the D-Link DIR-619L B1 router, specifically within the formResetStatistic function of the /goform/formResetStatistic file. By manipulating the curTime argument, an attacker can exploit this vulnerability remotely, potentially allowing unauthorized access and control over the device. Given the public disclosure of the exploit, it is imperative for users to apply security measures promptly to mitigate the risks associated with this issue.",D-link,Dir-619l B1,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-10T12:00:08.620Z,0 CVE-2024-9783,https://securityvulnerability.io/vulnerability/CVE-2024-9783,Buffer Overflow Vulnerability in D-Link DIR-619L B1,"A serious vulnerability exists in the D-Link DIR-619L B1 2.06, specifically in the formLogDnsquery functionality. This flaw allows an attacker to manipulate the curTime argument, which leads to a buffer overflow condition. This weakness can be exploited remotely, enabling attackers to execute malicious code or orchestrate further attacks on affected systems. Given that the exploit details have been made public, it is crucial for users of this device to implement urgent security measures to protect against potential exploitation. Comprehensive awareness and prompt action are recommended to safeguard your network.",D-link,Dir-619l B1,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-10T11:31:06.986Z,0 CVE-2024-9782,https://securityvulnerability.io/vulnerability/CVE-2024-9782,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"A serious buffer overflow vulnerability has been identified in the D-Link DIR-619L B1 router, specifically in the function formEasySetupWWConfig associated with the firmware version 2.06. This flaw allows for remote exploitation by manipulating the curTime argument, which can lead to unauthorized access and potential compromise of the device. Given that the exploit has already been made public, it is crucial for users and organizations utilizing the affected product to take immediate action to mitigate risks by applying relevant patches or implementing network security measures.",D-link,Dir-619l B1,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-10T11:31:05.102Z,0