First published: Wed Apr 07 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSL-320B-D1 | <=eu_1.25 | |
D-Link DSL-320B-D1 | ||
All of | ||
D-Link DSL-320B-D1 | <=eu_1.25 | |
D-Link DSL-320B-D1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26709 is a vulnerability in the D-Link DSL-320B-D1 devices through EU_1.25 that allows unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters.
CVE-2021-26709 has a severity rating of 9.8 out of 10, which is considered critical.
An attacker can exploit CVE-2021-26709 by sending malicious login.xgi user and pass parameters to the affected D-Link DSL-320B-D1 devices through EU_1.25, allowing them to take over the device remotely.
The vulnerability CVE-2021-26709 affects D-Link DSL-320B-D1 devices through EU_1.25.
As this vulnerability is no longer supported, there may not be an official fix available for CVE-2021-26709. It is recommended to update to a supported device or seek guidance from the vendor.