Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6rw4-c297-m856

Опубликовано: 22 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 72%
0.00735
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
11 месяцев назад

A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
fstec
11 месяцев назад

Уязвимость функции set_ws_action() микропрограммного обеспечения беспроводных повторителей D-Link DAP-1620, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 72%
0.00735
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787