cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-9570,https://securityvulnerability.io/vulnerability/CVE-2024-9570,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"A critical buffer overflow vulnerability has been identified in the D-Link DIR-619L B1 router, specifically affecting version 2.06. This issue is triggered by the manipulation of the 'curTime' argument within the 'formEasySetTimezone' function located in the /goform directory. An attacker can exploit this vulnerability remotely, potentially leading to unauthorized access and control over the device. The vulnerability has already been disclosed publicly, heightening the urgency for users to secure their devices against potential exploitation. It is crucial for users to apply any available security patches or updates provided by D-Link to mitigate this risk.",D-Link,Dir-619l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,true,true,false,false,2024-10-07T16:15:00.000Z,0 CVE-2024-9568,https://securityvulnerability.io/vulnerability/CVE-2024-9568,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"A vulnerability exists in the D-Link DIR-619L B1 2.06 router, specifically within the formAdvNetwork function. This vulnerability is triggered by manipulating the curTime argument, resulting in a buffer overflow. The flaw can be exploited remotely, enabling attackers to gain unauthorized access to the router. With public disclosure of this exploit, immediate action is necessary to mitigate potential risks to users' networks and data.",D-Link,Dir-619l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T15:15:00.000Z,0 CVE-2024-9569,https://securityvulnerability.io/vulnerability/CVE-2024-9569,Buffer Overflow Vulnerability in D-Link DIR-619L B1 Routers,"A buffer overflow vulnerability exists in the D-Link DIR-619L B1 router related to the formEasySetPassword function. This flaw occurs due to improper handling of the curTime parameter within the /goform/formEasySetPassword file, potentially allowing attackers to exploit this vulnerability remotely. The disclosure of this exploit raises serious concerns for device security, as it exposes users to unauthorized access and possible system compromise.",D-Link,Dir-619l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T15:15:00.000Z,0 CVE-2024-9567,https://securityvulnerability.io/vulnerability/CVE-2024-9567,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"A buffer overflow vulnerability exists in the D-Link DIR-619L router's formAdvFirewall function. This issue, caused by improper handling of the 'curTime' argument, allows for remote exploitation. Malicious actors can trigger the exploit to gain unauthorized access, potentially compromising the integrity and confidentiality of the device.",D-Link,Dir-619l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T14:15:00.000Z,0 CVE-2024-9566,https://securityvulnerability.io/vulnerability/CVE-2024-9566,Buffer Overflow Vulnerability in D-Link DIR-619L B1 Router,"A buffer overflow vulnerability exists in the D-Link DIR-619L B1 router, specifically affecting the formDeviceReboot function. This vulnerability allows an attacker to manipulate the 'next_page' argument in the '/goform/formDeviceReboot' file, leading to potential exploitation through remote access. The disclosure of this exploit highlights the urgent need for users to update their devices and implement security best practices to mitigate risks associated with unauthorized access.",D-Link,Dir-619l Firmware,8.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2024-10-07T13:15:00.000Z,0 CVE-2023-43869,https://securityvulnerability.io/vulnerability/CVE-2023-43869,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"The D-Link DIR-619L B1 router has been identified to be susceptible to a buffer overflow vulnerability through the formSetWAN_Wizard56 function. This flaw allows an attacker to execute arbitrary code on the device, potentially leading to unauthorized access, manipulation of the router settings, and compromise of the local network. It is crucial for users of this device to apply security updates and patches provided by the vendor to mitigate potential risks associated with this vulnerability.",D-Link,Dir-619l Firmware,9.8,CRITICAL,0.002259999979287386,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43867,https://securityvulnerability.io/vulnerability/CVE-2023-43867,Buffer Overflow Vulnerability in D-Link DIR-619L B1,"The D-Link DIR-619L B1 version 2.02 is susceptible to a buffer overflow vulnerability through the formSetWanL2TP function. This security flaw can potentially allow an attacker to manipulate memory operations, leading to unauthorized access or execution of arbitrary code. Users are urged to apply necessary patches and secure their devices to mitigate potential risks associated with this vulnerability.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43868,https://securityvulnerability.io/vulnerability/CVE-2023-43868,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"The D-Link DIR-619L B1 version 2.02 is susceptible to a buffer overflow vulnerability through the websGetVar function. This issue can potentially allow an attacker to execute arbitrary code, posing significant security risks to devices connected to this router. Users should apply provided patches or mitigate exposure to ensure the integrity of their network.",D-Link,Dir-619l Firmware,7.5,HIGH,0.001610000035725534,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43862,https://securityvulnerability.io/vulnerability/CVE-2023-43862,Buffer Overflow in D-Link DIR-619L B1 Product,"The D-Link DIR-619L B1 version 2.02 is susceptible to a buffer overflow vulnerability via the formLanguageChange function. This flaw can lead to denial of service or potential code execution, allowing unauthorized access or manipulation of the device's functionality. Users are advised to apply the latest security updates and follow best practices to mitigate risks associated with this vulnerability.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43863,https://securityvulnerability.io/vulnerability/CVE-2023-43863,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"The D-Link DIR-619L B1 version 2.02 has a vulnerability that allows for a buffer overflow attack through the formSetWanDhcpplus function. Exploiting this weakness can compromise the device's integrity, potentially enabling unauthorized access or manipulation of sensitive data within the network. Ensuring that your router is updated and secure against such attacks is crucial for maintaining a safe online environment.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43864,https://securityvulnerability.io/vulnerability/CVE-2023-43864,Buffer Overflow Vulnerability in D-Link DIR-619L B1 Router,"A buffer overflow vulnerability exists in the D-Link DIR-619L B1 2.02 router. This security flaw allows attackers to exploit the formSetWAN_Wizard55 function, potentially leading to unauthorized access or further exploitation. It's critical for users of this device to apply security updates and follow best practices to guard against potential attacks.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43861,https://securityvulnerability.io/vulnerability/CVE-2023-43861,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"The D-Link DIR-619L router, specifically version B1 2.02, is susceptible to a buffer overflow vulnerability. This issue arises from improper handling within the formSetWanPPPoE function, potentially allowing an attacker to exploit this weakness. If successfully exploited, it could lead to unauthorized access or control over the affected device, posing serious risks to network integrity and security. Users are encouraged to review security advisories and apply updates to mitigate this vulnerability.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43860,https://securityvulnerability.io/vulnerability/CVE-2023-43860,Buffer Overflow in D-Link DIR-619L Router,"The D-Link DIR-619L B1, specifically version 2.02, is susceptible to a buffer overflow vulnerability triggered by the formSetWanNonLogin function. An attacker could exploit this weakness to potentially execute arbitrary code, impacting the device's functionality and possibly compromising the user's network security.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43865,https://securityvulnerability.io/vulnerability/CVE-2023-43865,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"The D-Link DIR-619L B1 router version 2.02 has a vulnerability that allows for a buffer overflow through its formSetWanPPTP function. This weakness could potentially be exploited to execute arbitrary code, leading to unauthorized access or disruptions in service. Users of this device should be vigilant and take immediate action to mitigate risks associated with this vulnerability.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2023-43866,https://securityvulnerability.io/vulnerability/CVE-2023-43866,Buffer Overflow Vulnerability in D-Link DIR-619L Router,"The D-Link DIR-619L Router, specifically version B1 2.02, is susceptible to a Buffer Overflow vulnerability through the formSetWAN_Wizard7 function. This flaw could allow an attacker to potentially execute arbitrary code by sending specially crafted requests, thereby compromising the integrity and security of the device. It is crucial for users to evaluate their network security measures and apply the necessary updates to mitigate this vulnerability.",D-Link,Dir-619l Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2023-09-28T00:00:00.000Z,0 CVE-2020-19319,https://securityvulnerability.io/vulnerability/CVE-2020-19319,Buffer Overflow Vulnerability in D-Link 619L Router,"A buffer overflow vulnerability has been identified in the D-Link 619L Router, specifically in version B 2.06beta. This flaw arises due to improper handling of the FILECODE parameter during the login process. An attacker could exploit this vulnerability to execute arbitrary code, potentially compromising the security of the affected device. It is crucial for users of the D-Link 619L Router to apply necessary security patches and updates to mitigate the risks associated with this vulnerability.",D-Link,Dir-619l Firmware,9.8,CRITICAL,0.002240000059828162,false,false,false,false,,false,false,2023-09-11T00:00:00.000Z,0 CVE-2020-19323,https://securityvulnerability.io/vulnerability/CVE-2020-19323,Heap Buffer Overflow in D-Link DIR-619L Router,"A heap buffer overflow vulnerability exists in the mini_upnpd service of D-Link DIR-619L routers running firmware version 2.06beta. This flaw allows remote attackers to initiate a forced restart of the device by sending a specially crafted M-search request that exploits the ST parameter. The impact of this vulnerability is significant as it does not require any form of authentication, allowing unauthorized users to disrupt the device functionality easily.",D-Link,Dir-619l Firmware,7.5,HIGH,0.001829999964684248,false,false,false,false,,false,false,2023-09-11T00:00:00.000Z,0 CVE-2020-19320,https://securityvulnerability.io/vulnerability/CVE-2020-19320,Buffer Overflow Vulnerability in DLINK 619L Router,"A buffer overflow vulnerability has been identified in the DLINK 619L router. This issue arises from improper handling of the 'curTime' parameter during the login process. Exploiting this vulnerability could allow an attacker to execute arbitrary code on the affected device, compromising its security and potentially leading to unauthorized access. Users are urged to apply necessary updates and security patches to mitigate this risk. For further details, refer to the official security bulletin and community discussions on GitHub.",D-Link,Dir-619l Firmware,9.8,CRITICAL,0.002050000010058284,false,false,false,false,,false,false,2023-09-11T00:00:00.000Z,0 CVE-2023-37791,https://securityvulnerability.io/vulnerability/CVE-2023-37791,Stack Overflow Vulnerability in D-Link DIR-619L Router,"The D-Link DIR-619L v2.04(TW) router is susceptible to a stack overflow vulnerability, triggered by improper handling of the curTime parameter in the formLogin endpoint. This flaw can be exploited to execute arbitrary code, potentially allowing an attacker to gain unauthorized access to sensitive device functions.",D-Link,Dir-619l Firmware,9.8,CRITICAL,0.0035200000274926424,false,false,false,false,,false,false,2023-07-17T00:00:00.000Z,0 CVE-2018-20056,https://securityvulnerability.io/vulnerability/CVE-2018-20056,,An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. There is a stack-based buffer overflow allowing remote attackers to execute arbitrary code without authentication via the goform/formLanguageChange currTime parameter.,D-link,Dir-619l Firmware,9.8,CRITICAL,0.019710000604391098,false,false,false,false,,false,false,2018-12-11T09:00:00.000Z,0 CVE-2018-20057,https://securityvulnerability.io/vulnerability/CVE-2018-20057,,An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. goform/formSysCmd allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter.,D-link,Dir-619l Firmware,8.8,HIGH,0.01013999991118908,false,false,false,false,,false,false,2018-12-11T09:00:00.000Z,0