D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-Authentication-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Apr/15 | Mailing List Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10216 | Vendor Advisory |
https://www.dlink.com/en/security-bulletin | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-04-07T10:45:15
Updated: 2021-04-08T15:06:28
Reserved: 2021-02-05T00:00:00
Link: CVE-2021-26709
JSON object: View
NVD Information
Status : Modified
Published: 2021-04-07T11:15:12.167
Modified: 2024-05-17T01:55:11.953
Link: CVE-2021-26709
JSON object: View
Redhat Information
No data.
CWE