First published: Mon Sep 02 2024(Updated: )
D-Link DAP-2310 Hardware A Firmware 1.16RC028 allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the ATP binary that handles PHP HTTP GET requests for the Apache HTTP Server (httpd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-2310 | ||
Apache Http Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45623 is considered a critical vulnerability due to its potential for remote code execution via a stack-based buffer overflow.
To mitigate CVE-2024-45623, it is recommended to upgrade to a supported version of the D-Link DAP-2310 firmware, if available.
CVE-2024-45623 primarily affects users of the D-Link DAP-2310 hardware that runs an unsupported version of the firmware.
CVE-2024-45623 can be exploited by remote attackers who send specially crafted PHP HTTP GET requests to the affected device.
Yes, CVE-2024-45623 also affects the Apache HTTP Server but specifically in the context of the D-Link DAP-2310 hardware.