First published: Sun Oct 06 2024(Updated: )
A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This vulnerability affects the function formSetWanPPPoE of the file /goform/formSetWanPPPoE. The manipulation of the argument webpage leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-605L Firmware | =2.13b01 | |
D-Link DIR-605L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9557 is classified as a critical vulnerability due to its potential for remote exploitation and buffer overflow.
To fix CVE-2024-9557, you should update the D-Link DIR-605L firmware to a version that is not vulnerable to this issue.
CVE-2024-9557 affects the formSetWanPPPoE function in the D-Link DIR-605L firmware.
Yes, CVE-2024-9557 can be exploited remotely, allowing attackers to initiate an attack without local access.
CVE-2024-9557 facilitates buffer overflow attacks by manipulating specific arguments in the firmware.