First published: Thu Oct 05 2023(Updated: )
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-823g Firmware | =1.0.2b05 | |
Dlink Dir-823g | =a1 | |
All of | ||
Dlink Dir-823g Firmware | =1.0.2b05 | |
Dlink Dir-823g | =a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44836 is a vulnerability found in the D-Link DIR-823G A1V1.0.2B05 firmware that allows for a Denial of Service (DoS) attack.
CVE-2023-44836 occurs due to a buffer overflow vulnerability in the SetWLanRadioSettings function of the D-Link DIR-823G A1V1.0.2B05 firmware when processing the SSID parameter.
The severity of CVE-2023-44836 is high, with a severity value of 7.5.
An attacker can exploit CVE-2023-44836 by sending a crafted input to the SSID parameter, causing a buffer overflow and leading to a Denial of Service (DoS) attack.
Yes, D-Link has released a firmware update to address the buffer overflow vulnerability in the D-Link DIR-823G A1V1.0.2B05 firmware. It is recommended to update to the latest firmware version.