First published: Mon Oct 07 2024(Updated: )
A vulnerability, which was classified as critical, has been found in D-Link DIR-619L B1 2.06. This issue affects the function formAdvFirewall of the file /goform/formAdvFirewall. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-619L | =2.06b1 | |
dlink DIR-619L firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9567 has been classified as critical due to the potential for remote exploitation leading to a buffer overflow.
To fix CVE-2024-9567, update the D-Link DIR-619L firmware to the latest version that addresses this vulnerability.
CVE-2024-9567 can be exploited through a remote attack that manipulates the curTime argument, leading to a buffer overflow.
CVE-2024-9567 affects the D-Link DIR-619L router specifically with firmware version 2.06b1.
Yes, if successfully exploited, CVE-2024-9567 may allow attackers to execute arbitrary code, potentially leading to unauthorized access.