CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
97.2%
Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router allows remote attackers to execute arbitrary code via a long M-SEARCH request to UDP port 1900.
Vendor | Product | Version | CPE |
---|---|---|---|
d-link | di-604_broadband_router | * | cpe:2.3:h:d-link:di-604_broadband_router:*:*:*:*:*:*:*:* |
d-link | di-784 | * | cpe:2.3:h:d-link:di-784:*:*:*:*:*:*:*:* |
d-link | ebr-2310_ethernet_broadband_router | * | cpe:2.3:h:d-link:ebr-2310_ethernet_broadband_router:*:*:*:*:*:*:*:* |
d-link | wbr-1310_wireless_g_router | * | cpe:2.3:h:d-link:wbr-1310_wireless_g_router:*:*:*:*:*:*:*:* |
d-link | wbr-2310_rangebooster_g_router | * | cpe:2.3:h:d-link:wbr-2310_rangebooster_g_router:*:*:*:*:*:*:*:* |
dlink | di-524 | * | cpe:2.3:h:dlink:di-524:*:*:*:*:*:*:*:* |
dlink | di-624 | * | cpe:2.3:h:dlink:di-624:*:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/fulldisclosure/2006-07/0363.html
secunia.com/advisories/21081
securitytracker.com/id?1016511
www.eeye.com/html/research/advisories/AD20060714.html
www.kb.cert.org/vuls/id/971705
www.osvdb.org/27333
www.securityfocus.com/archive/1/440298/100/0/threaded
www.securityfocus.com/archive/1/440852/100/100/threaded
www.securityfocus.com/bid/19006
www.vupen.com/english/advisories/2006/2829
exchange.xforce.ibmcloud.com/vulnerabilities/27755