Description
A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetPassword.md
ExploitThird Party Advisory
https://vuldb.com/?ctiid.280238
Permissions RequiredThird Party AdvisoryVDB Entry
Third Party AdvisoryVDB Entry
https://vuldb.com/?submit.418741
Third Party AdvisoryVDB Entry
Product
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-10-13T13:15:11.117Z
1 year agoLast modified
2024-10-16T13:32:30.067Z
1 year ago