First published: Fri Jul 21 2006(Updated: )
Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router allows remote attackers to execute arbitrary code via a long M-SEARCH request to UDP port 1900.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DI-604 Broadband Router | ||
D-Link DI-784 | ||
D-Link EBR-2310 Ethernet Broadband Router | ||
D-Link Wireless Router | ||
D-Link WBR-2310 RangeBooster G Router | ||
D-Link DI-524 | ||
D-Link DI-624 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3687 is considered critical due to the potential for remote code execution.
To fix CVE-2006-3687, you should update your D-Link router firmware to the latest version provided by the manufacturer.
CVE-2006-3687 affects various D-Link routers including the DI-524, DI-604, DI-624, DI-784, WBR-1310, WBR-2310, and EBR-2310.
Yes, CVE-2006-3687 can be exploited remotely without requiring authentication.
Exploiting CVE-2006-3687 could allow attackers to execute arbitrary code on the targeted D-Link router.