First published: Sun Oct 06 2024(Updated: )
A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. This affects the function formSetWAN_Wizard51/formSetWAN_Wizard52. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-605L Firmware | =2.13b01 | |
D-Link DIR-605L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9561 is classified as a critical vulnerability.
To fix CVE-2024-9561, update the D-Link DIR-605L firmware to a patched version released after 2.13B01.
CVE-2024-9561 allows for a remote buffer overflow due to improper handling of the curTime argument.
CVE-2024-9561 affects the D-Link DIR-605L running firmware version 2.13B01.
Yes, CVE-2024-9561 can be exploited remotely by an attacker.