Metrics
Affected Vendors & Products
Wed, 13 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dlink
Dlink di-8003 Dlink di-8003 Firmware |
|
CPEs | cpe:2.3:h:dlink:di-8003:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-8003_firmware:16.07.16a1:*:*:*:*:*:*:* |
|
Vendors & Products |
Dlink
Dlink di-8003 Dlink di-8003 Firmware |
Tue, 12 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
D-link
D-link di-8003 Firmware |
|
CPEs | cpe:2.3:o:d-link:di-8003_firmware:16.07.16a1:*:*:*:*:*:*:* | |
Vendors & Products |
D-link
D-link di-8003 Firmware |
|
Metrics |
ssvc
|
Sun, 10 Nov 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in D-Link DI-8003 16.07.16A1. It has been declared as critical. Affected by this vulnerability is the function upgrade_filter_asp of the file /upgrade_filter.asp. The manipulation of the argument path leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |
Title | D-Link DI-8003 upgrade_filter.asp upgrade_filter_asp stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-11-12T15:46:48.981Z
Reserved: 2024-11-09T08:08:34.041Z
Link: CVE-2024-11047

Updated: 2024-11-12T15:46:42.034Z

Status : Analyzed
Published: 2024-11-10T04:15:15.950
Modified: 2024-11-13T20:56:10.463
Link: CVE-2024-11047

No data.