cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-9564,https://securityvulnerability.io/vulnerability/CVE-2024-9564,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A serious buffer overflow vulnerability exists in the D-Link DIR-605L router, specifically linked to the formWlanWizardSetup function within the /goform/formWlanWizardSetup file. This vulnerability can be exploited remotely, allowing attackers to manipulate input arguments to execute unauthorized commands and potentially take control of the device. Security measures should be implemented immediately as the exploit details have been publicly disclosed, making affected systems vulnerable to attacks.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T01:15:00.000Z,0 CVE-2024-9563,https://securityvulnerability.io/vulnerability/CVE-2024-9563,Buffer Overflow Vulnerability in D-Link DIR-605L Wireless Router,"A serious vulnerability has been identified in the D-Link DIR-605L router with version 2.13B01 BETA. This issue specifically resides within the formWlanSetup_Wizard function located in the /goform directory, where improper handling of the 'webpage' argument can lead to a buffer overflow condition. This vulnerability allows an attacker to execute arbitrary code remotely, posing a significant threat to network security. As the details of this exploit have been publicly disclosed, users of the affected router are strongly advised to take immediate action to mitigate potential risks.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T00:15:00.000Z,0 CVE-2024-9549,https://securityvulnerability.io/vulnerability/CVE-2024-9549,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA,"The D-Link DIR-605L router is subject to a buffer overflow vulnerability originating from the function formEasySetupWizard/formEasySetupWizard2. This issue arises due to manipulation of the 'curTime' argument, allowing for potential remote exploitation. As the vulnerability has been publicly disclosed, attackers can exploit the affected versions, gaining unauthorized access and control over the router's functionalities. Users of the DIR-605L must apply necessary precautions and stay updated on security patches to mitigate the risks associated with this vulnerability.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-06T04:15:00.000Z,0 CVE-2024-9515,https://securityvulnerability.io/vulnerability/CVE-2024-9515,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"A buffer overflow vulnerability exists in the D-Link DIR-605L router, specifically within the formSetQoS function located in the /goform/formSetQoS file. This flaw arises from an improper validation of the curTime argument, allowing attackers to exploit the vulnerability remotely. Once exploited, this flaw could lead to unauthorized access or other malicious activities, posing significant risks to network security. The vulnerability has been publicly disclosed, heightening the urgency for affected users to assess their security posture and update their devices accordingly.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-04T14:15:00.000Z,0 CVE-2024-9514,https://securityvulnerability.io/vulnerability/CVE-2024-9514,Buffer Overflow Vulnerability in D-Link DIR-605L 2.13B01 BETA Router,"A vulnerability exists in the D-Link DIR-605L 2.13B01 BETA router that allows for remote exploitation through the formSetDomainFilter function. The manipulation of the curTime argument can lead to a buffer overflow, enabling an attacker to execute arbitrary commands or gain unauthorized access. The details of the exploit have been publicly disclosed, increasing the urgency for users to secure their devices and apply necessary mitigations.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-04T14:15:00.000Z,0 CVE-2020-19318,https://securityvulnerability.io/vulnerability/CVE-2020-19318,Buffer Overflow Vulnerability in D-Link DIR-605L Router,"The buffer overflow vulnerability in the D-Link DIR-605L router, particularly in hardware version AX and firmware version 1.17beta and below, allows an authorized attacker to execute arbitrary code by sending specially crafted data to the web server service. This issue poses significant risks as it could lead to unauthorized access and control over the affected device, compromising network security and data integrity.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0008699999889358878,false,false,false,false,,false,false,2023-09-11T00:00:00.000Z,0 CVE-2023-29961,https://securityvulnerability.io/vulnerability/CVE-2023-29961,Stack Overflow Vulnerability in D-Link DIR-605L Firmware,The firmware version 1.17B01 BETA of the D-Link DIR-605L router is susceptible to a stack overflow vulnerability when processing specific requests to the /goform/formTcpipSetup endpoint. This vulnerability could allow an attacker to execute arbitrary code or cause a denial of service (DoS) by exploiting the way input data is handled. Users of affected firmware should apply necessary security updates or workarounds to mitigate potential risks.,D-Link,Dir-605l Firmware,9.8,CRITICAL,0.0028899998869746923,false,false,false,false,,false,false,2023-05-16T01:15:00.000Z,0 CVE-2023-24350,https://securityvulnerability.io/vulnerability/CVE-2023-24350,Stack Overflow Vulnerability in D-Link N300 WI-FI Router DIR-605L,"The D-Link N300 WI-FI Router DIR-605L v2.13B01 is prone to a stack overflow vulnerability triggered through the malformed config.smtp_email_subject parameter at the /goform/formSetEmail endpoint. This flaw could allow attackers to execute arbitrary code, compromising device integrity, and leading to potential unauthorized control over the network. Users are advised to implement security measures as per the latest updates provided by D-Link.",D-Link,Dir-605l Firmware,9.8,CRITICAL,0.00279000005684793,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24344,https://securityvulnerability.io/vulnerability/CVE-2023-24344,Stack Overflow Vulnerability in D-Link N300 WI-FI Router,"The D-Link N300 WI-FI Router DIR-605L v2.13B01 is susceptible to a stack overflow vulnerability that can be exploited through the 'webpage' parameter in the /goform/formWlanGuestSetup endpoint. Attackers may leverage this flaw to execute arbitrary code or launch denial-of-service attacks, compromising the integrity and availability of the network environment. Users are advised to update their firmware to mitigate potential exploitation.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0017300000181421638,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24345,https://securityvulnerability.io/vulnerability/CVE-2023-24345,Stack Overflow Vulnerability in D-Link N300 Router,"A stack overflow vulnerability has been identified in the D-Link N300 WI-FI Router DIR-605L v2.13B01. This flaw can be exploited via the 'curTime' parameter on the /goform/formSetWanDhcpplus endpoint, allowing unauthorized users to execute arbitrary code or potentially disrupt router operations. This issue necessitates immediate attention to protect affected devices from exploitation. Users are advised to review security updates from D-Link to mitigate risks.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0013899999903514981,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24351,https://securityvulnerability.io/vulnerability/CVE-2023-24351,Stack Overflow Vulnerability in D-Link N300 Wi-Fi Router,"A stack overflow vulnerability exists in the D-Link N300 Wi-Fi Router DIR-605L v2.13B01, caused by improper handling of the FILECODE parameter during login at /goform/formLogin. This flaw could allow attackers to exploit the system, potentially leading to unauthorized access or other malicious activities.",D-Link,Dir-605l Firmware,9.8,CRITICAL,0.00279000005684793,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24343,https://securityvulnerability.io/vulnerability/CVE-2023-24343,Stack Overflow Vulnerability in D-Link N300 WI-FI Router,"The D-Link N300 WI-FI Router DIR-605L, specifically version v2.13B01, is affected by a stack overflow vulnerability. This flaw is triggered through the passing of the curTime parameter at the /goform/formSchedule endpoint. Successful exploitation of this vulnerability could allow attackers to execute arbitrary code, potentially compromising the router's security and the network it serves. Users are encouraged to apply any available patches or updates to mitigate the risk.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0009699999936856329,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24346,https://securityvulnerability.io/vulnerability/CVE-2023-24346,Stack Overflow Vulnerability in D-Link N300 Wi-Fi Router,"A stack overflow vulnerability has been identified in the D-Link N300 Wi-Fi Router model DIR-605L, specifically through the 'wan_connected' parameter at the '/goform/formEasySetupWizard3' endpoint. This flaw could be exploited by attackers, potentially allowing them to execute arbitrary code or cause a Denial of Service on the affected device. Users are encouraged to review the available security updates and implement necessary measures to protect their networks.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0013899999903514981,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24347,https://securityvulnerability.io/vulnerability/CVE-2023-24347,Stack Overflow Vulnerability in D-Link N300 WI-FI Router,"A stack overflow vulnerability has been identified in the D-Link N300 WI-FI Router DIR-605L (v2.13B01), which may allow an attacker to exploit the system through a specially crafted request to the /goform/formSetWanDhcpplus endpoint. This could lead to unauthorized access or disruption of network services. Users are urged to review security updates and apply the necessary patches to mitigate this vulnerability.",D-Link,Dir-605l Firmware,8.8,HIGH,0.0017300000181421638,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24348,https://securityvulnerability.io/vulnerability/CVE-2023-24348,Stack Overflow Vulnerability in D-Link N300 WI-FI Router,"The D-Link N300 WI-FI Router DIR-605L version v2.13B01 has been found to be vulnerable to a stack overflow via the 'curTime' parameter at the '/goform/formSetACLFilter' endpoint. This vulnerability could potentially allow remote attackers to execute arbitrary code, posing significant risks to the network's integrity and user data. It is essential for users to prioritize security measures and patch vulnerabilities promptly to mitigate possible exploitation.",D-Link,Dir-605l Firmware,9.8,CRITICAL,0.00279000005684793,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24349,https://securityvulnerability.io/vulnerability/CVE-2023-24349,Stack Overflow Vulnerability in D-Link N300 WI-FI Router,"A stack overflow vulnerability has been identified in the D-Link N300 WI-FI Router DIR-605L version v2.13B01. This vulnerability is triggered by intricate manipulations of the 'curTime' parameter at the '/goform/formSetRoute' endpoint. An attacker could exploit this flaw to potentially execute arbitrary code or disrupt normal operation of the device, thus compromising the security and integrity of the local network.",D-Link,Dir-605l Firmware,9.8,CRITICAL,0.00279000005684793,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2023-24352,https://securityvulnerability.io/vulnerability/CVE-2023-24352,Stack Overflow Vulnerability in D-Link N300 WI-FI Router,"A stack overflow vulnerability has been identified in the D-Link N300 WI-FI Router DIR-605L v2.13B01, which can be exploited through the 'webpage' parameter at /goform/formWPS. This flaw poses a risk to the device's security, potentially allowing unauthorized access or disruption of service. Users of this router model should prioritize updating their firmware to mitigate potential risks associated with this vulnerability.",D-Link,Dir-605l Firmware,9.8,CRITICAL,0.003470000112429261,false,false,false,false,,false,false,2023-02-10T00:00:00.000Z,0 CVE-2021-40655,https://securityvulnerability.io/vulnerability/CVE-2021-40655,,An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page,D-Link,Dir-605l Firmware,7.5,HIGH,0.05096999928355217,true,false,false,true,,false,false,2021-09-24T20:11:51.000Z,0 CVE-2017-17065,https://securityvulnerability.io/vulnerability/CVE-2017-17065,,"An issue was discovered on D-Link DIR-605L Model B before FW2.11betaB06_hbrf devices, related to the code that handles the authentication values for HNAP. An attacker can cause a denial of service (device crash) or possibly have unspecified other impact by sending a sufficiently long string in the password field of the HTTP Basic Authentication section of the HTTP request.",D-Link,Dir-605l Model B Firmware,7.5,HIGH,0.001180000021122396,false,false,false,false,,false,false,2017-11-30T17:00:00.000Z,0 CVE-2017-9675,https://securityvulnerability.io/vulnerability/CVE-2017-9675,,"On D-Link DIR-605L devices, firmware before 2.08UIBetaB01.bin allows an unauthenticated GET request to trigger a reboot.",D-Link,Dir-605l Firmware,7.5,HIGH,0.010420000180602074,false,false,false,false,,false,false,2017-06-15T19:00:00.000Z,0