First published: Sun Oct 06 2024(Updated: )
A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critical. Affected by this vulnerability is the function formSetWanL2TP of the file /goform/formSetWanL2TP. The manipulation of the argument webpage leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-605L Firmware | =2.13b01 | |
D-Link DIR-605L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-9551 is declared as critical.
CVE-2024-9551 affects D-Link DIR-605L by allowing a buffer overflow through the manipulation of the webpage argument in the formSetWanL2TP function.
D-Link DIR-605L firmware version 2.13B01 is impacted by CVE-2024-9551.
Exploiting CVE-2024-9551 could allow an attacker to execute arbitrary code on the affected device.
To mitigate the risks associated with CVE-2024-9551, it is recommended to update the D-Link DIR-605L to a patched firmware version.