First published: Sun Oct 13 2024(Updated: )
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been rated as critical. This issue affects the function formSetRoute of the file /goform/formSetRoute. The manipulation of the argument curTime leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-619L | =2.06b1 | |
dlink DIR-619L firmware | =b1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9913 has been rated as critical due to its potential for remote exploitation leading to buffer overflow.
To remediate CVE-2024-9913, users should update their D-Link DIR-619L to firmware version that addresses the vulnerability.
CVE-2024-9913 is vulnerable to remote attacks that exploit buffer overflow through the manipulation of the curTime argument.
CVE-2024-9913 affects the D-Link DIR-619L router specifically with firmware version 2.06b1.
CVE-2024-9913 is primarily a remote vulnerability, meaning it can be exploited without local access to the device.