We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been rated as critical. Affected by this issue is the function formSetWanL2TP. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Eine kritische Schwachstelle wurde in D-Link DIR-600L bis 2.07B01 ausgemacht. Es geht hierbei um die Funktion formSetWanL2TP. Mittels dem Manipulieren des Arguments host mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden.
2025-05-05: | Advisory disclosed |
2025-05-05: | VulDB entry created |
2025-05-05: | VulDB entry last update |
B1Nn (VulDB User)
vuldb.com/?id.307466 (VDB-307466 | D-Link DIR-600L formSetWanL2TP buffer overflow)
vuldb.com/?ctiid.307466 (VDB-307466 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.558301 (Submit #558301 | D-Link DIR-600L 2.07B01 Buffer Overflow)
github.com/...uffer_ovrflow-formSetWanL2TP-curTime/README.md
www.dlink.com/
Support options