Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49871 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip/type parameter of the jingx.asp function. |
Wed, 18 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link di-7003gv2.d1 D-link di-700g Plus V2.d1 D-link di-7100g.v2.d1 D-link di-7200g Plus V2.d1 D-link di-7200gv2.e1 D-link di-7300g Plus V2.d1 D-link di-7400g Plus V2.d1 |
|
| CPEs | cpe:2.3:h:d-link:di-7003gv2.d1:*:*:*:*:*:*:*:* cpe:2.3:h:d-link:di-700g_plus_v2.d1:*:*:*:*:*:*:*:* cpe:2.3:h:d-link:di-7100g.v2.d1:*:*:*:*:*:*:*:* cpe:2.3:h:d-link:di-7200g_plus_v2.d1:*:*:*:*:*:*:*:* cpe:2.3:h:d-link:di-7200gv2.e1:*:*:*:*:*:*:*:* cpe:2.3:h:d-link:di-7300g_plus_v2.d1:*:*:*:*:*:*:*:* cpe:2.3:h:d-link:di-7400g_plus_v2.d1:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
D-link
D-link di-7003gv2.d1 D-link di-700g Plus V2.d1 D-link di-7100g.v2.d1 D-link di-7200g Plus V2.d1 D-link di-7200gv2.e1 D-link di-7300g Plus V2.d1 D-link di-7400g Plus V2.d1 |
|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-18T13:55:41.402Z
Reserved: 2023-10-09T00:00:00.000Z
Link: CVE-2023-45579
Updated: 2024-08-02T20:21:16.625Z
Status : Modified
Published: 2023-10-16T07:15:09.027
Modified: 2024-11-21T08:26:59.830
Link: CVE-2023-45579
No data.
OpenCVE Enrichment
No data.
EUVD