First published: Mon Oct 16 2023(Updated: )
Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wanid parameter of the H5/speedlimit.data function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Di-7003g Firmware | <=23.08.25d1 | |
Dlink Di-7003g | =v2.d1 | |
Dlink Di-7100g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7100g\+ | =v2.d1 | |
Dlink Di-7100g Firmware | <=23.08.23d1 | |
Dlink Di-7100g | =v2.d1 | |
Dlink Di-7200g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7200g\+ | =v2.d1 | |
Dlink Di-7200g Firmware | <=23.08.23e1 | |
Dlink Di-7200g | =v2.e1 | |
Dlink Di-7300g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7300g\+ | =v2.d1 | |
Dlink Di-7400g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7400g\+ | =v2.d1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45577 is critical with a score of 9.8.
D-Link devices DI-7003GV2.D1, DI-7100G+V2.D1, DI-7100GV2.D1, DI-7200G+V2.D1, DI-7200GV2.E1, DI-7300G+V2.D1, and DI-7400G+V2.D1 are affected by CVE-2023-45577.
The vulnerability in D-Link device DI-7003GV2.D1 is a stack overflow vulnerability.
To fix the vulnerability in D-Link device DI-7100GV2.D1, update to firmware version 23.08.24D1 or later.
More information about CVE-2023-45577 can be found at the following link: [GitHub - CVE-2023-45577](https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug9.md)