First published: Fri Feb 10 2023(Updated: )
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWlanGuestSetup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-605l Firmware | =2.13b01 | |
Dlink Dir-605l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the D-Link N300 WI-FI Router DIR-605L stack overflow is CVE-2023-24344.
The severity of CVE-2023-24344 is high with a severity value of 8.8.
The vulnerability in D-Link N300 WI-FI Router DIR-605L occurs due to a stack overflow via the webpage parameter at /goform/formWlanGuestSetup.
The software version 2.13b01 of D-Link N300 WI-FI Router DIR-605L is affected by the vulnerability.
More information about the D-Link N300 WI-FI Router DIR-605L stack overflow vulnerability can be found at the following references: [https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01](https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01) and [https://www.dlink.com/en/security-bulletin/](https://www.dlink.com/en/security-bulletin/)