First published: Fri Aug 18 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the inet_ntoa() function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-868l Firmware | =1.12_eu_multi_20170316 | |
Dlink Dir-868l | =a | |
All of | ||
Dlink Dir-868l Firmware | =1.12_eu_multi_20170316 | |
Dlink Dir-868l | =a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-39668 is critical.
CVE-2023-39668 allows for a buffer overflow vulnerability in the inet_ntoa() function of the D-Link DIR-868L firmware version 1.12_eu_multi_20170316.
Yes, the D-Link DIR-868L firmware version 1.12_eu_multi_20170316 is vulnerable to CVE-2023-39668.
To fix CVE-2023-39668, it is recommended to update the D-Link DIR-868L firmware to a version that has a patch for the buffer overflow vulnerability.
You can find more information about CVE-2023-39668 at the following references: [GitHub](https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L%20Buffer%20overflow%202.md), [D-Link Support](https://support.dlink.com/), [D-Link Security Bulletin](https://www.dlink.com/en/security-bulletin/).