First published: Mon Oct 16 2023(Updated: )
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the remove_ext_proto/remove_ext_port parameter of the upnp_ctrl.asp function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Di-7003g Firmware | <=23.08.25d1 | |
Dlink Di-7003g | =v2.d1 | |
Dlink Di-7100g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7100g\+ | =v2.d1 | |
Dlink Di-7100g Firmware | <=23.08.23d1 | |
Dlink Di-7100g | =v2.d1 | |
Dlink Di-7200g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7200g\+ | =v2.d1 | |
Dlink Di-7200g Firmware | <=23.08.23e1 | |
Dlink Di-7200g | =v2.e1 | |
Dlink Di-7300g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7300g\+ | =v2.d1 | |
Dlink Di-7400g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7400g\+ | =v2.d1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45576 is critical.
D-Link devices DI-7003GV2.D1, DI-7100G+V2.D1, DI-7100GV2.D1, DI-7200G+V2.D1, DI-7200GV2.E1, DI-7300G+V2.D1, and DI-7400G+V2.D1 are affected by CVE-2023-45576.
The CWE ID associated with CVE-2023-45576 are CWE-119 and CWE-787.
To fix the CVE-2023-45576 vulnerability, update the firmware of the affected D-Link devices to version 23.08.26D1 or higher.
More information about CVE-2023-45576 can be found at the following link: [CVE-2023-45576](https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug3.md).