Vulnerability Description
D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dsl-320B-D1 | <= eu_1.25 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-AuthenticatioExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2021/Apr/15Mailing ListThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1Vendor Advisory
- https://www.dlink.com/en/security-bulletinVendor Advisory
- http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-AuthenticatioExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2021/Apr/15Mailing ListThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1Vendor Advisory
- https://www.dlink.com/en/security-bulletinVendor Advisory
FAQ
What is CVE-2021-26709?
CVE-2021-26709 is a vulnerability with a CVSS score of 9.8 (CRITICAL). D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass paramete...
How severe is CVE-2021-26709?
CVE-2021-26709 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-26709?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dsl-320B-D1.