Lucene search

K
nvd[email protected]NVD:CVE-2023-45572
HistoryOct 16, 2023 - 6:15 a.m.

CVE-2023-45572

2023-10-1606:15:12
CWE-787
web.nvd.nist.gov
buffer overflow
d-link
di-7003gv2.d1
di-7100g+v2.d1
di-7100gv2.d1
di-7200g+v2.d1
di-7200gv2.e1
di-7300g+v2.d1
di-7400g+v2.d1
remote code execution

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.002

Percentile

58.4%

Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the tgfile.htm function.

Affected configurations

NVD
Node
dlinkdi-7003gMatchv2.d1
AND
dlinkdi-7003g_firmwareRange23.08.25d1
Node
dlinkdi-7100g\+Matchv2.d1
AND
dlinkdi-7100g\+_firmwareRange23.08.23d1
Node
dlinkdi-7100gMatchv2.d1
AND
dlinkdi-7100g_firmwareRange23.08.23d1
Node
dlinkdi-7200g\+Matchv2.d1
AND
dlinkdi-7200g\+_firmwareRange23.08.23d1
Node
dlinkdi-7200gMatchv2.e1
AND
dlinkdi-7200g_firmwareRange23.08.23e1
Node
dlinkdi-7300g\+Matchv2.d1
AND
dlinkdi-7300g\+_firmwareRange23.08.23d1
Node
dlinkdi-7400g\+Matchv2.d1
AND
dlinkdi-7400g\+_firmwareRange23.08.23d1

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.002

Percentile

58.4%

Related for NVD:CVE-2023-45572