Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-5294
Analyzed
More InfoOfficial Page
Source-zdi-disclosures@trendmicro.com
View Known Exploited Vulnerability (KEV) details
Published At-23 May, 2024 | 22:15
Updated At-06 Aug, 2025 | 14:25

D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of D-Link DIR-3040 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prog.cgi program, which handles HNAP requests made to the lighttpd webserver listening on ports 80 and 443. The issue results from the lack of proper memory management when processing HTTP cookie values. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. . Was ZDI-CAN-21668.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.04.3MEDIUM
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CPE Matches

D-Link Corporation
dlink
>>dir-3040_firmware>>120b03
cpe:2.3:o:dlink:dir-3040_firmware:120b03:*:*:*:*:*:*:*
D-Link Corporation
dlink
>>dir-3040>>-
cpe:2.3:h:dlink:dir-3040:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-401Secondaryzdi-disclosures@trendmicro.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.zerodayinitiative.com/advisories/ZDI-24-445/zdi-disclosures@trendmicro.com
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-24-445/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Change History
0Changes found

Details not found