cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-11960,https://securityvulnerability.io/vulnerability/CVE-2024-11960,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A critical buffer overflow vulnerability has been identified in the D-Link DIR-605L router firmware version 2.13B01. This security flaw resides in the formSetPortTr function, specifically within the /goform/formSetPortTr file. An attacker can exploit this vulnerability remotely by manipulating the curTime argument, which results in a buffer overflow. The exploit has been published publicly, increasing the risk of potential attacks. Users are strongly advised to apply security updates and monitor their devices to prevent unauthorized access.",D-link,Dir-605l,8.8,HIGH,0.001500000013038516,false,false,false,true,true,false,false,2024-11-28T14:31:09.257Z,0 CVE-2024-11959,https://securityvulnerability.io/vulnerability/CVE-2024-11959,Buffer Overflow in D-Link DIR-605L Affects Device Security,"CVE-2024-11959 is a critical vulnerability located in the D-Link DIR-605L firmware version 2.13B01. This buffer overflow vulnerability arises from improper handling of the 'curTime' argument in the formResetStatistic function of the /goform/formResetStatistic file. An attacker can exploit this flaw remotely, potentially leading to unauthorized access and control over the affected device. The public disclosure of this exploit underlines the urgency in implementing mitigation strategies to safeguard network security. Users are advised to update their firmware or take necessary precautions to mitigate potential risks.",D-link,Dir-605l,8.8,HIGH,0.001500000013038516,false,false,false,true,true,false,false,2024-11-28T14:31:05.705Z,0 CVE-2024-9564,https://securityvulnerability.io/vulnerability/CVE-2024-9564,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A serious buffer overflow vulnerability exists in the D-Link DIR-605L router, specifically linked to the formWlanWizardSetup function within the /goform/formWlanWizardSetup file. This vulnerability can be exploited remotely, allowing attackers to manipulate input arguments to execute unauthorized commands and potentially take control of the device. Security measures should be implemented immediately as the exploit details have been publicly disclosed, making affected systems vulnerable to attacks.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T01:15:00.000Z,0 CVE-2024-9565,https://securityvulnerability.io/vulnerability/CVE-2024-9565,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA,"A vulnerability exists in the D-Link DIR-605L router, specifically in the formSetPassword function located in the /goform/formSetPassword file. The flaw arises from improper handling of the curTime argument, which may lead to a buffer overflow condition. This security loophole can be exploited remotely, potentially allowing attackers to execute arbitrary code. The vulnerability has been made public, heightening the risk of exploitation.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-07T00:31:04.727Z,0 CVE-2024-9563,https://securityvulnerability.io/vulnerability/CVE-2024-9563,Buffer Overflow Vulnerability in D-Link DIR-605L Wireless Router,"A serious vulnerability has been identified in the D-Link DIR-605L router with version 2.13B01 BETA. This issue specifically resides within the formWlanSetup_Wizard function located in the /goform directory, where improper handling of the 'webpage' argument can lead to a buffer overflow condition. This vulnerability allows an attacker to execute arbitrary code remotely, posing a significant threat to network security. As the details of this exploit have been publicly disclosed, users of the affected router are strongly advised to take immediate action to mitigate potential risks.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T00:15:00.000Z,0 CVE-2024-9562,https://securityvulnerability.io/vulnerability/CVE-2024-9562,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A significant buffer overflow vulnerability has been identified in the D-Link DIR-605L router, specifically within the formSetWizard1 and formSetWizard2 functions. By manipulating the 'curTime' argument, attackers can execute arbitrary code remotely, potentially compromising the device's integrity and security. As this vulnerability has been publicly disclosed, it presents a serious risk to users who have not yet applied necessary patches or updates. It is essential for D-Link DIR-605L users to take immediate action to secure their devices against potential exploits.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T23:00:08.085Z,0 CVE-2024-9561,https://securityvulnerability.io/vulnerability/CVE-2024-9561,Buffer Overflow Vulnerability in D-Link DIR-605L Products,"A severe buffer overflow vulnerability exists in the D-Link DIR-605L router, specifically affecting the functions formSetWAN_Wizard51 and formSetWAN_Wizard52. This flaw arises from improper handling of the curTime argument, allowing attackers to exploit this vulnerability remotely. The implications of such an attack include unauthorized system access and potential manipulation of device settings. Given that the exploit has been publicly disclosed, it is crucial for users and administrators to update their devices and implement safeguards to prevent exploitation of this flaw. Comprehensive threat assessments and patch management should be prioritized to ensure network security.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T22:31:05.077Z,0 CVE-2024-9559,https://securityvulnerability.io/vulnerability/CVE-2024-9559,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A significant vulnerability has been detected in the D-Link DIR-605L router specifically concerning the formWlanSetup function located within the /goform/ directory. This issue arises from improper argument handling of the 'webpage' parameter, which can lead to a buffer overflow condition. As a result, attackers can exploit this vulnerability remotely, allowing unauthorized access and control over affected devices. It is crucial for users of the D-Link DIR-605L to take immediate action to secure their systems to prevent potential exploitation of this disclosed vulnerability.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T18:31:05.056Z,0 CVE-2024-9558,https://securityvulnerability.io/vulnerability/CVE-2024-9558,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA,"A buffer overflow vulnerability exists in the D-Link DIR-605L router that can be exploited through manipulation of the 'webpage' argument within the formSetWanPPTP function. This flaw presents significant security risks, allowing potential remote attackers to execute arbitrary code or affect device stability. Proper patching and protective measures are essential to safeguard network infrastructure and mitigate risks associated with this vulnerability.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T18:00:07.916Z,0 CVE-2024-9557,https://securityvulnerability.io/vulnerability/CVE-2024-9557,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A critical vulnerability has been identified in the D-Link DIR-605L router, specifically within the formSetWanPPPoE function found in the /goform/formSetWanPPPoE file. This flaw allows remote attackers to manipulate the argument 'webpage', which can lead to a buffer overflow. Exploitation of this vulnerability can compromise the device's functionality and potentially lead to unauthorized access. As the details have been publicly disclosed, it poses a significant risk to affected users, making it imperative to address this issue promptly.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T16:31:04.928Z,0 CVE-2024-9556,https://securityvulnerability.io/vulnerability/CVE-2024-9556,Buffer Overflow in D-Link DIR-605L Affects Remote Access,"A critical buffer overflow vulnerability has been identified in the D-Link DIR-605L router, specifically within the function formSetEnableWizard in the file /goform/formSetEnableWizard. This flaw arises from insufficient validation of the curTime argument, enabling attackers to exploit the vulnerability remotely. If successfully executed, this could allow unauthorized users to gain control of the affected device, posing significant risks to network security. The vulnerability has been publicly disclosed and should be addressed immediately to mitigate potential threats.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T15:31:05.435Z,0 CVE-2024-9555,https://securityvulnerability.io/vulnerability/CVE-2024-9555,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A critical security flaw has been identified in the D-Link DIR-605L router, specifically within the formSetEasy_Wizard function located in the /goform/formSetEasy_Wizard file. This vulnerability allows for remote manipulation of the curTime argument, leading to a potentially severe buffer overflow condition. Attackers could exploit this flaw to execute unauthorized commands or gain access to sensitive information. The exploit has been made public, emphasizing the urgent need for users to apply security patches and perform necessary updates to safeguard their devices and secure their networks against potential exploitation.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T14:31:05.253Z,0 CVE-2024-9553,https://securityvulnerability.io/vulnerability/CVE-2024-9553,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A critical buffer overflow vulnerability exists in the D-Link DIR-605L router, specifically within the formdumpeasysetup function located in the /goform directory. This vulnerability is triggered by improper handling of the 'curTime' argument, allowing remote attackers to potentially exploit the flaw and execute arbitrary code on the device. The vulnerability has been publicly disclosed, increasing the risk of exploitation. Users are strongly advised to take immediate action to secure their devices and consider updating to the latest firmware version available to mitigate this risk.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T10:31:05.033Z,0 CVE-2024-9552,https://securityvulnerability.io/vulnerability/CVE-2024-9552,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A critical buffer overflow vulnerability has been identified in the D-Link DIR-605L router. This flaw resides in the formSetWanNonLogin function within the /goform/formSetWanNonLogin file. By manipulating the 'webpage' argument, an attacker can trigger a buffer overflow, potentially leading to unauthorized access or execution of arbitrary code on the device. This vulnerability can be exploited remotely, which poses significant risks to users relying on this device for internet connectivity. The exploit has already been publicly disclosed, increasing the urgency for users to apply necessary mitigations and updates to protect their networks.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T10:00:06.436Z,0 CVE-2024-9551,https://securityvulnerability.io/vulnerability/CVE-2024-9551,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA,"A buffer overflow vulnerability has been identified in the D-Link DIR-605L router, specifically within the formSetWanL2TP function of the /goform/formSetWanL2TP file. This vulnerability allows remote attackers to manipulate the 'webpage' argument, potentially leading to unauthorized access and exploitation of the device's resources. The issue is critical as it has been publicly disclosed, increasing the risk of attacks exploiting this weakness. D-Link users are highly encouraged to implement necessary security measures to mitigate potential threats associated with this vulnerability.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T09:31:05.172Z,0 CVE-2024-9550,https://securityvulnerability.io/vulnerability/CVE-2024-9550,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA Could Allow Remote Attack,"A vulnerability exists in the D-Link DIR-605L router concerning the function formLogDnsquery located in the /goform/formLogDnsquery file. The issue arises from improper handling of the curTime parameter, leading to a buffer overflow. This vulnerability allows for remote exploitation, meaning that unauthorized individuals could potentially exploit this flaw without direct access to the device. The exploit has been publicly disclosed and poses a significant security risk to users of this router model.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-06T09:00:07.990Z,0 CVE-2024-9549,https://securityvulnerability.io/vulnerability/CVE-2024-9549,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA,"The D-Link DIR-605L router is subject to a buffer overflow vulnerability originating from the function formEasySetupWizard/formEasySetupWizard2. This issue arises due to manipulation of the 'curTime' argument, allowing for potential remote exploitation. As the vulnerability has been publicly disclosed, attackers can exploit the affected versions, gaining unauthorized access and control over the router's functionalities. Users of the DIR-605L must apply necessary precautions and stay updated on security patches to mitigate the risks associated with this vulnerability.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-06T04:15:00.000Z,0 CVE-2024-9535,https://securityvulnerability.io/vulnerability/CVE-2024-9535,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"The D-Link DIR-605L router version 2.13B01 BETA is susceptible to a buffer overflow vulnerability due to improper handling of arguments in the formEasySetupWWConfig function located in the file /goform/formEasySetupWWConfig. This vulnerability allows attackers to potentially exploit the device remotely by manipulating the curTime argument, leading to unauthorized access or control of the router. The exploit has been publicly disclosed, making it essential for users to apply patches or consider alternative security measures to mitigate the risks associated with this vulnerability.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-05T14:00:06.607Z,0 CVE-2024-9534,https://securityvulnerability.io/vulnerability/CVE-2024-9534,Buffer Overflow Vulnerability in D-Link's DIR-605L 2.13B01 BETA,"A vulnerability exists in the D-Link DIR-605L router that allows for remote exploitation via a buffer overflow in the formEasySetPassword function located within the /goform directory. By manipulating the curTime argument, attackers can potentially execute arbitrary code on the device. This vulnerability could lead to severe security implications as it exposes the router to unauthorized access. The exploit has been publicly disclosed, emphasizing the importance of prompt remediation.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-05T13:31:05.105Z,0 CVE-2024-9533,https://securityvulnerability.io/vulnerability/CVE-2024-9533,Buffer Overflow Vulnerability in D-Link DIR-605L,"A significant vulnerability has been identified in the D-Link DIR-605L router, specifically within the remote management functionality located in the formDeviceReboot endpoint. The flaw allows an authenticated attacker to manipulate the 'next_page' argument, which can result in a buffer overflow condition. This vulnerability poses a risk of remote exploitation, as it can be triggered without physical access to the device. With public disclosure of the exploit, users are strongly advised to take immediate action to secure their routers and ensure that firmware is up to date to mitigate potential attacks.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-05T13:00:07.156Z,0 CVE-2024-9532,https://securityvulnerability.io/vulnerability/CVE-2024-9532,Buffer Overflow Vulnerability in D-Link DIR-605L,"A serious buffer overflow vulnerability has been identified in the D-Link DIR-605L router, particularly affecting the function formAdvanceSetup located in the file /goform/formAdvanceSetup. Malicious actors can exploit this vulnerability by manipulating the 'webpage' argument, leading to potential unauthorized access to system memory and execution of arbitrary code. The exploit can be triggered remotely, making it essential for users to apply necessary mitigations promptly. The disclosure of this vulnerability highlights the importance of securing network devices and implementing stringent update policies for firmware.",D-link,Dir-605l,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-05T08:00:07.102Z,0 CVE-2024-9514,https://securityvulnerability.io/vulnerability/CVE-2024-9514,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA Router,"A vulnerability exists in the D-Link DIR-605L 2.13B01 BETA router that allows for remote exploitation through the formSetDomainFilter function. The manipulation of the curTime argument can lead to a buffer overflow, enabling an attacker to execute arbitrary commands or gain unauthorized access. The details of the exploit have been publicly disclosed, increasing the urgency for users to secure their devices and apply necessary mitigations.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-04T14:15:00.000Z,0 CVE-2024-9515,https://securityvulnerability.io/vulnerability/CVE-2024-9515,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A buffer overflow vulnerability exists in the D-Link DIR-605L router, specifically within the formSetQoS function located in the /goform/formSetQoS file. This flaw arises from an improper validation of the curTime argument, allowing attackers to exploit the vulnerability remotely. Once exploited, this flaw could lead to unauthorized access or other malicious activities, posing significant risks to network security. The vulnerability has been publicly disclosed, heightening the urgency for affected users to assess their security posture and update their devices accordingly.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-04T14:15:00.000Z,0 CVE-2020-19318,https://securityvulnerability.io/vulnerability/CVE-2020-19318,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"The buffer overflow vulnerability in the D-Link DIR-605L router, particularly in hardware version AX and firmware version 1.17beta and below, allows an authorized attacker to execute arbitrary code by sending specially crafted data to the web server service. This issue poses significant risks as it could lead to unauthorized access and control over the affected device, compromising network security and data integrity.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0008699999889358878,false,false,false,false,,false,false,2023-09-11T00:00:00.000Z,0 CVE-2023-29961,https://securityvulnerability.io/vulnerability/CVE-2023-29961,Stack Overflow Vulnerability in D-Link DIR-605L Firmware,The firmware version 1.17B01 BETA of the D-Link DIR-605L router is susceptible to a stack overflow vulnerability when processing specific requests to the /goform/formTcpipSetup endpoint. This vulnerability could allow an attacker to execute arbitrary code or cause a denial of service (DoS) by exploiting the way input data is handled. Users of affected firmware should apply necessary security updates or workarounds to mitigate potential risks.,D-Link,Dir-605l Firmware,9.8,CRITICAL,0.0028899998869746923,false,false,false,false,,false,false,2023-05-16T01:15:00.000Z,0