First published: Wed Dec 01 2021(Updated: )
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-809 Firmware | <=1.12wwb03 | |
Dlink Dir-809 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33267 is critical with a CVSS score of 9.8.
The affected software of CVE-2021-33267 is D-Link DIR-809 devices with firmware up to and including DIR-809Ax_FW1.12WWB03_20190410.
The vulnerability in CVE-2021-33267 can be triggered via a crafted POST request.
No, Dlink DIR-809 is not vulnerable to CVE-2021-33267.
To fix the vulnerability in CVE-2021-33267, it is recommended to update the firmware of D-Link DIR-809 devices to a version that patches the vulnerability.