A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formAdvNetwork of the file /goform/formAdvNetwork. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formAdvNetwork.md | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.279462 | Permissions Required | 
| https://vuldb.com/?id.279462 | Third Party Advisory | 
| https://vuldb.com/?submit.414545 | Third Party Advisory | 
| https://www.dlink.com/ | Product | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    09 Oct 2024, 13:04
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:* | |
| References | () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formAdvNetwork.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.279462 - Permissions Required | |
| References | () https://vuldb.com/?id.279462 - Third Party Advisory | |
| References | () https://vuldb.com/?submit.414545 - Third Party Advisory | |
| References | () https://www.dlink.com/ - Product | |
| First Time | Dlink dir-619l Firmware Dlink Dlink dir-619l | |
| Summary | 
 | 
07 Oct 2024, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-10-07 15:15
Updated : 2024-10-09 13:04
NVD link : CVE-2024-9568
Mitre link : CVE-2024-9568
CVE.ORG link : CVE-2024-9568
JSON object : View
Products Affected
                dlink
- dir-619l_firmware
- dir-619l
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
