Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-26709
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-07 Apr, 2021 | 11:15
Updated At-03 Aug, 2024 | 21:15

D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

D-Link Corporation
d-link
>>dsl-320b-d1>>Versions up to eu_1.25(inclusive)
cpe:2.3:o:d-link:dsl-320b-d1:*:*:*:*:*:*:*:*
D-Link Corporation
d-link
>>dsl-320b-d1>>-
cpe:2.3:h:d-link:dsl-320b-d1:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-Authentication-Buffer-Overflow.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2021/Apr/15cve@mitre.org
Mailing List
Third Party Advisory
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10216cve@mitre.org
Vendor Advisory
https://www.dlink.com/en/security-bulletincve@mitre.org
Vendor Advisory
Change History
0Changes found

Details not found