First published: Thu Oct 05 2023(Updated: )
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the MacAddress parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-823g Firmware | =1.0.2b05 | |
Dlink Dir-823g | =a1 | |
All of | ||
Dlink Dir-823g Firmware | =1.0.2b05 | |
Dlink Dir-823g | =a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44832 is a buffer overflow vulnerability in the D-Link DIR-823G A1V1.0.2B05 router firmware.
CVE-2023-44832 allows attackers to cause a Denial of Service (DoS) by exploiting a buffer overflow via the MacAddress parameter in the SetWanSettings function.
CVE-2023-44832 has a severity rating of 7.5 (high).
To fix CVE-2023-44832, it is recommended to update the D-Link DIR-823G A1V1.0.2B05 router firmware to a patched version provided by D-Link.
You can find more information about CVE-2023-44832 in the following references: [link to GitHub repository](https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWanSettings_MacAddress) and [link to D-Link security bulletin](https://www.dlink.com/en/security-bulletin/).