First published: Mon Sep 11 2023(Updated: )
An issue was discovered in /bin/mini_upnpd on D-Link DIR-619L 2.06beta devices. There is a heap buffer overflow allowing remote attackers to restart router via the M-search request ST parameter. No authentication required
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-619l Firmware | =2.06-beta | |
Dlink Dir-619l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-19323 is an issue discovered in /bin/mini_upnpd on D-Link DIR-619L 2.06beta devices, allowing remote attackers to restart the router via the M-search request ST parameter without authentication.
CVE-2020-19323 has a severity rating of 7.5 out of 10, indicating a high level of severity.
The D-Link DIR-619L 2.06beta firmware is affected by CVE-2020-19323.
An attacker can exploit CVE-2020-19323 by sending a malicious M-search request with a specially crafted ST parameter, causing a heap buffer overflow and remotely restarting the router.
Yes, there are references available for CVE-2020-19323. You can find more information at the following links: [GitHub](https://github.com/hhhhu8045759/619L_upnpd_heapoverflow) and [D-Link Security Bulletin](https://www.dlink.com/en/security-bulletin/).