First published: Thu Oct 05 2023(Updated: )
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Password parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-823g Firmware | =1.0.2b05 | |
Dlink Dir-823g | =a1 | |
All of | ||
Dlink Dir-823g Firmware | =1.0.2b05 | |
Dlink Dir-823g | =a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44837 is a vulnerability found in D-Link DIR-823G A1V1.0.2B05 that allows a buffer overflow via the Password parameter in the SetWanSettings function.
CVE-2023-44837 allows attackers to cause a Denial of Service (DoS) by sending a crafted input.
The severity of CVE-2023-44837 is high, with a CVSS score of 7.5.
To fix CVE-2023-44837, update your D-Link DIR-823G A1V1.0.2B05 firmware to a version that addresses the vulnerability. Check the D-Link website or security bulletin for the latest firmware release.
The CWE IDs associated with CVE-2023-44837 are CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input).