First published: Mon Oct 16 2023(Updated: )
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the file.data function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Di-7003g Firmware | <=23.08.25d1 | |
Dlink Di-7003g | =v2.d1 | |
Dlink Di-7100g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7100g\+ | =v2.d1 | |
Dlink Di-7100g Firmware | <=23.08.23d1 | |
Dlink Di-7100g | =v2.d1 | |
Dlink Di-7200g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7200g\+ | =v2.d1 | |
Dlink Di-7200g Firmware | <=23.08.23e1 | |
Dlink Di-7200g | =v2.e1 | |
Dlink Di-7300g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7300g\+ | =v2.d1 | |
Dlink Di-7400g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7400g\+ | =v2.d1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45574 is critical (9.8).
The D-Link devices DI-7003GV2.D1, DI-7100G+V2.D1, DI-7100GV2.D1, DI-7200G+V2.D1, DI-7200GV2.E1, DI-7300G+V2.D1, and DI-7400G+V2.D1 are affected by CVE-2023-45574.
A buffer overflow vulnerability can be exploited by overflowing a buffer to overwrite adjacent memory and execute arbitrary code.
Yes, D-Link has released firmware updates to address the buffer overflow vulnerability. Users should update their affected devices to the latest firmware version provided by the manufacturer.
More information about CVE-2023-45574 can be found on the GitHub repository and the D-Link security bulletin linked in the references.