fkie_cve-2024-57376
Vulnerability from fkie_nvd
Published
2025-01-28 22:15
Modified
2025-07-01 15:15
Severity ?
Summary
Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsr-150_firmware | * | |
dlink | dsr-150 | - | |
dlink | dsr-150n_firmware | * | |
dlink | dsr-150n | - | |
dlink | dsr-250_firmware | * | |
dlink | dsr-250 | - | |
dlink | dsr-250n_firmware | * | |
dlink | dsr-250n | - | |
dlink | dsr-500_firmware | * | |
dlink | dsr-500 | - | |
dlink | dsr-1000n_firmware | * | |
dlink | dsr-1000n | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B310A40-D26D-4C06-B3FF-15AB47406909", "versionEndIncluding": "3.17B901C", "versionStartIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F9246BA-7F85-4564-B1B5-03BBBF9E2F35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94821C08-DF39-4150-B3EB-CF6B74A5E971", "versionEndIncluding": "3.17B901C", "versionStartIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*", "matchCriteriaId": "729C8468-E3D3-4089-B095-A41C719E9F8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FE39937-BD26-4543-B716-F33BE64E86B0", "versionEndIncluding": "3.17B901C", "versionStartIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*", "matchCriteriaId": "702F0FE2-5E5A-4E2B-8B7A-A0C84FF74F4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D489612E-5E25-4CE0-8CA4-00AA2DC8C9F2", "versionEndIncluding": "3.17B901C", "versionStartIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8754060-E58E-4A9A-AB59-0279E8BC793A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBD12433-5C6B-4F30-BD62-6CDDEDE5F191", "versionEndIncluding": "3.17B901C", "versionStartIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF00635-340E-4116-8B4A-46138C13C9C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA55E761-BAAC-45E1-82B9-CE2046CC5DAB", "versionEndIncluding": "3.17b901c", "versionStartIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE07EC6-89F9-4E76-A5CE-B8EA28727F9A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution." }, { "lang": "es", "value": "La vulnerabilidad de desbordamiento de b\u00fafer en D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N de 3.13 a 3.17B901C permite a usuarios no autenticados ejecutar c\u00f3digo remoto." } ], "id": "CVE-2024-57376", "lastModified": "2025-07-01T15:15:40.243", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-01-28T22:15:15.990", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.dlink.com/en/security-bulletin/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…