First published: Mon Sep 16 2024(Updated: )
The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
D-Link DIR-X5460 Firmware | =1.01 | |
D-Link DIR-X5460 Firmware | =1.02 | |
D-Link DIR-X5460 Firmware | =1.04 | |
D-Link DIR-X5460 Firmware | =1.10 | |
D-Link DIR-X5460 | =a1 | |
All of | ||
Any of | ||
Dlink Dir-x4860 Firmware | =1.00 | |
Dlink Dir-x4860 Firmware | =1.04 | |
Dlink Dir-x4860 Firmware | =a1 |
Update frimware of DIR-X5460 A1 to version 1.11B04 or later. Update firmware of DIR-X4860 A1 to version 1.04B05 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45694 is classified as a high-severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2024-45694, upgrade the firmware of affected D-Link routers to the latest version provided by the vendor.
CVE-2024-45694 affects certain firmware versions of D-Link DIR-X5460 and DIR-X4860 routers.
Yes, CVE-2024-45694 allows unauthenticated attackers to exploit the vulnerability remotely.
CVE-2024-45694 is a stack-based buffer overflow vulnerability.