Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2v55-9vh6-3j74

Опубликовано: 22 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 72%
0.00735
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
11 месяцев назад

A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
fstec
11 месяцев назад

Уязвимость функции check_dws_cookie() микропрограммного обеспечения беспроводных повторителей D-Link DAP-1620, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 72%
0.00735
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787