First published: Tue Jan 28 2025(Updated: )
Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSR-150 | >=3.13<3.17B901C | |
D-Link DSR-150N | >=3.13<3.17B901C | |
D-Link DSR-250 Firmware | >=3.13<3.17B901C | |
D-Link DSR-250N | >=3.13<3.17B901C | |
D-Link DSR-500N Firmware | >=3.13<3.17B901C | |
D-Link DSR-1000N Firmware | >=3.13<3.17B901C |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57376 has a high severity rating due to the potential for remote code execution by unauthenticated users.
To fix CVE-2024-57376, update your D-Link device firmware to a version later than 3.17B901C.
CVE-2024-57376 affects D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, and DSR-1000N with firmware versions from 3.13 to 3.17B901C.
Yes, CVE-2024-57376 can be exploited remotely by unauthenticated users, allowing them to execute arbitrary code.
CVE-2024-57376 is classified as a buffer overflow vulnerability.