First published: Sun Oct 13 2024(Updated: )
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formSetQoS of the file /goform/formSetQoS. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-619L | =2.06b1 | |
dlink DIR-619L firmware | =b1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9912 has been declared as critical due to its potential for remote exploitation.
CVE-2024-9912 exploits a buffer overflow vulnerability in the formSetQoS function available in the device's web interface.
CVE-2024-9912 affects D-Link DIR-619L firmware version 2.06b1.
To protect against CVE-2024-9912, ensure that your D-Link DIR-619L firmware is updated to the latest patched version.
Yes, CVE-2024-9912 can be exploited remotely, allowing attackers to manipulate the vulnerability from an external location.