First published: Thu Oct 05 2023(Updated: )
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-823G firmware | =1.0.2b05 | |
D-Link DIR-823G | =a1 | |
D-Link DIR-823G firmware | =1.0.2b05 | |
D-Link DIR-823G | =a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-44829.
CVE-2023-44829 has a severity score of 7.5, which is considered high.
CVE-2023-44829 allows attackers to cause a Denial of Service (DoS) on the D-Link DIR-823G A1V1.0.2B05 firmware through a buffer overflow vulnerability.
If your D-Link DIR-823G firmware version is 1.0.2b05, then it is vulnerable to CVE-2023-44829.
To fix the CVE-2023-44829 vulnerability, it is recommended to update your D-Link DIR-823G firmware to a version that is not affected by the vulnerability. Check the D-Link security bulletin for the latest updates.