First published: Mon Oct 16 2023(Updated: )
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the pap_en/chap_en parameter of the pppoe_base.asp function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Di-7003g Firmware | <=23.08.25d1 | |
Dlink Di-7003g | =v2.d1 | |
Dlink Di-7100g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7100g\+ | =v2.d1 | |
Dlink Di-7100g Firmware | <=23.08.23d1 | |
Dlink Di-7100g | =v2.d1 | |
Dlink Di-7200g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7200g\+ | =v2.d1 | |
Dlink Di-7200g Firmware | <=23.08.23e1 | |
Dlink Di-7200g | =v2.e1 | |
Dlink Di-7300g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7300g\+ | =v2.d1 | |
Dlink Di-7400g\+ Firmware | <=23.08.23d1 | |
Dlink Di-7400g\+ | =v2.d1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45578 is critical with a CVSS score of 9.8.
D-Link devices DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 are affected by CVE-2023-45578.
To fix the buffer overflow vulnerability in D-Link devices with CVE-2023-45578, it is recommended to apply the latest firmware update provided by D-Link.
The Common Weakness Enumeration (CWE) ID associated with CVE-2023-45578 is CWE-119 and CWE-787.
More information about CVE-2023-45578 can be found at the following reference: https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug4.md