CVE-2024-1786Classic Buffer Overflow in D-link Dir-600m C1

Severity
7.5HIGHNVD
EPSS
0.7%
top 29.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 23

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-600M C1 3.08. Affected by this issue is some unknown functionality of the component Telnet Service. The manipulation of the argument username leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254576. NOTE: This vulnerability only affects products that are no longer sup

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

2
CVEList
D-Link DIR-600M C1 Telnet Service buffer overflow2024-02-23
GHSA
GHSA-wrvf-j637-77w5: ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DIR-600M C1 32024-02-23
CVE-2024-1786 — Classic Buffer Overflow in D-link | cvebase