Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 21 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dap-1513 Dlink dap-1513 Firmware |
|
| CPEs | cpe:2.3:h:dlink:dap-1513:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dap-1513_firmware:1.01:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dap-1513 Dlink dap-1513 Firmware |
Tue, 17 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-476 | |
| Metrics |
cvssV3_1
|
Tue, 17 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-17T16:49:12.300Z
Reserved: 2024-05-30T00:00:00.000Z
Link: CVE-2024-36832
Updated: 2024-12-17T16:48:18.328Z
Status : Analyzed
Published: 2024-12-17T15:15:13.097
Modified: 2025-05-21T13:21:05.300
Link: CVE-2024-36832
No data.
OpenCVE Enrichment
No data.