cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-9535,https://securityvulnerability.io/vulnerability/CVE-2020-9535,Stack-Based Buffer Overflow in D-Link DIR-615Jx10 Devices,"The D-Link DIR-615Jx10 device is vulnerable to a stack-based buffer overflow due to improper handling of input on the formWlanSetup_Wizard webpage. When the f_radius_ip1 parameter is supplied with malformed data, it can lead to potential remote exploitation, allowing attackers to execute arbitrary code or disrupt the device's functionality. This vulnerability highlights the importance of proper validation and sanitization of user inputs in web-based management interfaces.",D-Link,Dir-615jx10 Firmware,8.8,HIGH,0.0008399999933317304,false,,false,false,false,,,false,false,,2020-03-02T00:15:00.000Z,0 CVE-2020-9534,https://securityvulnerability.io/vulnerability/CVE-2020-9534,Stack-Based Buffer Overflow in D-Link DIR-615Jx10 Devices,"A stack-based buffer overflow vulnerability exists in D-Link DIR-615Jx10 devices specifically through the `formWlanSetup` webpage parameter. When a malformed input is provided for the `f_radius_ip1` parameter, it can lead to critical security issues. This flaw could potentially allow an attacker to execute arbitrary code or disrupt the operation of the affected device.",D-Link,Dir-615jx10 Firmware,8.8,HIGH,0.0008399999933317304,false,,false,false,false,,,false,false,,2020-03-02T00:15:00.000Z,0