Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qfgw-2hj2-mgmg

Опубликовано: 22 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 72%
0.00735
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
11 месяцев назад

A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 9.8
fstec
11 месяцев назад

Уязвимость функции check_dws_cooki() микропрограммного обеспечения беспроводных повторителей D-Link DAP-1620, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 72%
0.00735
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-787