First published: Sun Oct 13 2024(Updated: )
A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-619L | =2.06b1 | |
dlink DIR-619L firmware | =b1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9910 is classified as a critical vulnerability due to its potential for remote exploitation and the risks associated with buffer overflow.
To mitigate CVE-2024-9910, update the D-Link DIR-619L firmware to a version that addresses this vulnerability.
Yes, CVE-2024-9910 can be exploited remotely by manipulating the curTime argument in the formSetPassword function.
CVE-2024-9910 affects the D-Link DIR-619L B1 firmware version 2.06b1.
CVE-2024-9910 can facilitate a buffer overflow attack, potentially allowing unauthorized access or control over the affected device.