First published: Tue May 14 2024(Updated: )
A buffer overflow vulnerability in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 via formWlanGuestSetup allows remote authenticated users to trigger a denial of service (DoS) through the parameter "webpage."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-619L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33773 is considered a high severity vulnerability due to its potential to cause a denial of service (DoS).
To fix CVE-2024-33773, update the D-Link DIR-619L Rev.B firmware to the latest version provided by D-Link.
CVE-2024-33773 affects the D-Link DIR-619L Rev.B router running firmware version 2.06B1.
Remote authenticated users can exploit CVE-2024-33773 by manipulating the 'webpage' parameter.
The impact of CVE-2024-33773 includes potential denial of service, causing the device to become unresponsive.