First published: Tue May 14 2024(Updated: )
A buffer overflow vulnerability in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 via formTcpipSetup allows remote authenticated users to trigger a denial of service (DoS) through the parameter "curTime."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-619L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33772 is classified as a high severity vulnerability due to its ability to allow remote authenticated users to execute a denial of service attack.
To mitigate CVE-2024-33772, update the D-Link DIR-619L firmware to the latest version provided by D-Link.
CVE-2024-33772 affects users of the D-Link DIR-619L Rev.B with firmware version 2.06B1.
Yes, CVE-2024-33772 can be exploited remotely by authenticated users through the affected parameter.
Exploiting CVE-2024-33772 may lead to a denial of service, rendering the device unresponsive to legitimate requests.