First published: Sun Nov 10 2024(Updated: )
A vulnerability was found in D-Link DI-8003 16.07.16A1. It has been declared as critical. Affected by this vulnerability is the function upgrade_filter_asp of the file /upgrade_filter.asp. The manipulation of the argument path leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dlink Di-8003 | =16.07.16a1 | |
D-Link DI-8003 Firmware | =a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11047 has been declared as critical severity due to the stack-based buffer overflow it causes.
To mitigate CVE-2024-11047, update the D-Link DI-8003 firmware to a version that addresses this vulnerability.
CVE-2024-11047 affects the D-Link DI-8003 firmware version 16.07.16A1.
CVE-2024-11047 is classified as a stack-based buffer overflow vulnerability.
Exploitation of CVE-2024-11047 could allow an attacker to execute arbitrary code on the affected device.