First published: Fri Feb 10 2023(Updated: )
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the config.smtp_email_subject parameter at /goform/formSetEmail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-605l Firmware | =2.13b01 | |
Dlink Dir-605l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24350 is critical with a CVSS score of 9.8.
CVE-2023-24350 affects D-Link N300 WI-FI Router DIR-605L v2.13B01 by exploiting a stack overflow vulnerability in the config.smtp_email_subject parameter.
Yes, D-Link N300 WI-FI Router DIR-605L v2.13B01 is the only affected software version of the Dlink Dir-605l Firmware.
To fix the stack overflow vulnerability in D-Link N300 WI-FI Router DIR-605L v2.13B01, update to a patched version of the firmware provided by D-Link.
More information about CVE-2023-24350 can be found at the following references: - GitHub: https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/03 - D-Link Security Bulletin: https://www.dlink.com/en/security-bulletin/