cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-43196,https://securityvulnerability.io/vulnerability/CVE-2023-43196,Stack Overflow Vulnerability in D-Link Router Product,"A security flaw was identified in the D-Link DI-7200GV2.E1 router, specifically in the arp_sys.asp function. This vulnerability arises from a stack overflow condition triggered by the zn_jb parameter, which could potentially allow attackers to execute arbitrary code, compromising the integrity and security of the device.",D-Link,Di-7200g Firmware,9.8,CRITICAL,0.002469999948516488,false,false,false,false,,false,false,2023-09-20T00:00:00.000Z,0 CVE-2023-43197,https://securityvulnerability.io/vulnerability/CVE-2023-43197,Stack Overflow Vulnerability in D-Link DI-7200GV2 Device,"The D-Link DI-7200GV2 device has a vulnerability that allows a stack overflow through the fn parameter in the tgfile.asp function. This security flaw could potentially allow attackers to execute arbitrary code or gain unauthorized access to sensitive data, compromising the integrity and availability of the device and the network it serves.",D-Link,Di-7200g Firmware,9.8,CRITICAL,0.002469999948516488,false,false,false,false,,false,false,2023-09-20T00:00:00.000Z,0 CVE-2023-43200,https://securityvulnerability.io/vulnerability/CVE-2023-43200,Stack Overflow Vulnerability in D-Link DI-7200GV2 Router,"A stack overflow vulnerability has been identified in the D-Link DI-7200GV2 router, specifically affecting version 21.04.09E1. The vulnerability occurs through improper handling of the 'id' parameter in the yyxz.data function, potentially allowing attackers to execute arbitrary code or disrupt normal operation of the device. This could enable unauthorized access to sensitive information or manipulation of network traffic.",D-Link,Di-7200g Firmware,9.8,CRITICAL,0.002469999948516488,false,false,false,false,,false,false,2023-09-20T00:00:00.000Z,0 CVE-2023-43198,https://securityvulnerability.io/vulnerability/CVE-2023-43198,Stack Overflow Vulnerability in D-Link DI-7200GV2 Product,"A stack overflow vulnerability has been identified in the D-Link DI-7200GV2 device, specifically in the H5/hi_block.asp function through the popupId parameter. This vulnerability can potentially allow an attacker to execute arbitrary code, compromising the integrity and security of the device. Users are advised to apply the latest patches and updates to mitigate this issue and protect their networks.",D-Link,Di-7200g Firmware,9.8,CRITICAL,0.002469999948516488,false,false,false,false,,false,false,2023-09-20T00:00:00.000Z,0 CVE-2023-43201,https://securityvulnerability.io/vulnerability/CVE-2023-43201,Stack Overflow Vulnerability in D-Link Router DI-7200GV2,"The D-Link router model DI-7200GV2, specifically version v21.04.09E1, has been found to contain a stack overflow vulnerability. This issue arises from improper handling of the 'hi_up' parameter within the 'qos_ext.asp' function, potentially allowing attackers to exploit this weakness to execute arbitrary code or disrupt device functionality. Users of the affected product are strongly advised to implement available patches and monitor network traffic for any unusual activity.",D-Link,Di-7200g Firmware,9.8,CRITICAL,0.002259999979287386,false,false,false,false,,false,false,2023-09-20T00:00:00.000Z,0 CVE-2023-43199,https://securityvulnerability.io/vulnerability/CVE-2023-43199,Stack Overflow Vulnerability in D-Link DI-7200GV2 Device,The D-Link DI-7200GV2 device version 21.04.09E1 is susceptible to a stack overflow vulnerability through the 'prev' parameter in the H5/login.cgi function. This flaw could be exploited by an attacker to execute arbitrary code or potentially gain unauthorized access to the device. Proper mitigation measures and updates are advised to secure affected devices.,D-Link,Di-7200g Firmware,9.8,CRITICAL,0.002469999948516488,false,false,false,false,,false,false,2023-09-20T00:00:00.000Z,0