cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-45572,https://securityvulnerability.io/vulnerability/CVE-2023-45572,Buffer Overflow Issue in D-Link Networking Devices,"A buffer overflow vulnerability has been identified in several D-Link networking devices, specifically within the tgfile.htm function. This vulnerability may allow a remote attacker to execute arbitrary code, potentially compromising the integrity of the device. Affected devices include various models such as DI-7003GV2, DI-7100G+V2, DI-7200G+V2, and others, all of which are susceptible to exploitation if not patched. Users are advised to update their devices to the latest versions to mitigate this risk.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45573,https://securityvulnerability.io/vulnerability/CVE-2023-45573,Buffer Overflow Vulnerability in D-Link DI Series Devices,"A buffer overflow vulnerability exists in various D-Link DI series devices, allowing remote attackers to exploit the 'n' parameter of the 'mrclfile_del.asp' function. This overflow can enable them to execute arbitrary code, potentially compromising the device and the network it's connected to. This issue affects multiple models and versions, making it crucial for users to apply patches and updates promptly to secure their systems.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45575,https://securityvulnerability.io/vulnerability/CVE-2023-45575,Stack Overflow Vulnerability in D-Link Networking Devices,"A stack overflow vulnerability exists in multiple D-Link devices, affecting various models and versions. This flaw can be exploited by a remote attacker to execute arbitrary code by manipulating the 'ip' parameter in the 'ip_position.asp' function. Exploitation could lead to unauthorized access, impacting device integrity and confidentiality.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45576,https://securityvulnerability.io/vulnerability/CVE-2023-45576,Buffer Overflow Vulnerability in D-Link DI Series Devices,"A buffer overflow vulnerability has been identified in several D-Link DI series devices, which could allow remote attackers to execute arbitrary code. This vulnerability is present in the upnp_ctrl.asp function, specifically through the remove_ext_proto/remove_ext_port parameters. Affected devices include multiple versions of the DI-7003GV2, DI-7100G+V2, DI-7100GV2, DI-7200G+V2, DI-7200GV2, DI-7300G+V2, and DI-7400G+V2, all prior to specified versions. Users are advised to review their device versions and apply necessary updates to mitigate potential attacks.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45579,https://securityvulnerability.io/vulnerability/CVE-2023-45579,Buffer Overflow Vulnerability in D-Link Devices,"A buffer overflow vulnerability exists in various D-Link devices that allows a remote attacker to execute arbitrary code. This vulnerability is triggered via the 'ip/type' parameter in the 'jingx.asp' function. Affected devices include DI-7003GV2.D1, DI-7100G+V2.D1, DI-7100GV2.D1, DI-7200G+V2.D1, DI-7200GV2.E1, DI-7300G+V2.D1, and DI-7400G+V2.D1 that have not been updated to their latest firmware versions.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45577,https://securityvulnerability.io/vulnerability/CVE-2023-45577,Stack Overflow Vulnerability in D-Link Networking Devices,"A stack overflow vulnerability exists in multiple D-Link networking devices, allowing remote attackers to execute arbitrary code. The issue arises from improper handling of the 'wanid' parameter in the H5/speedlimit.data function. Attackers can exploit this vulnerability by sending specially crafted requests, potentially compromising the affected devices and networks.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45580,https://securityvulnerability.io/vulnerability/CVE-2023-45580,Buffer Overflow Vulnerability in D-Link Devices,"A buffer overflow vulnerability exists in D-Link devices, specifically in the ddns.asp function. This vulnerability enables remote attackers to execute arbitrary code by manipulating parameters such as wild/mx. The affected devices include multiple models within the D-Link DI series, which may expose users to potential unauthorized access and control if not addressed promptly. Users are urged to review their device firmware and apply necessary patches to enhance security.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45574,https://securityvulnerability.io/vulnerability/CVE-2023-45574,Buffer Overflow Vulnerability in D-Link DI-7003GV2.D1 and Other Models,"A buffer overflow vulnerability exists in multiple D-Link devices including DI-7003GV2.D1, allowing remote attackers to exploit the fn parameter of the file.data function. This could lead to the execution of arbitrary code, putting sensitive information and network integrity at risk. Users are encouraged to promptly apply available security updates to mitigate potential attacks.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004769999999552965,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0 CVE-2023-45578,https://securityvulnerability.io/vulnerability/CVE-2023-45578,Buffer Overflow Vulnerability in D-Link DI-7003GV2 and DI-7100G Series Devices,"A buffer overflow vulnerability has been identified in various D-Link devices, including the DI-7003GV2 and DI-7100G series. This vulnerability arises when a remote attacker sends specially crafted input through the pap_en/chap_en parameter in the pppoe_base.asp function, allowing them to execute arbitrary code on the affected devices. Users are advised to update their firmware to the latest versions to mitigate potential exploits and secure their networks.",D-Link,Di-7003g Firmware,9.8,CRITICAL,0.004840000066906214,false,false,false,false,,false,false,2023-10-16T00:00:00.000Z,0