{"id":60989,"date":"2025-01-29T22:50:41","date_gmt":"2025-01-29T19:50:41","guid":{"rendered":"https:\/\/cvefeed.io\/vuln\/detail\/CVE-2024-57376"},"modified":"2025-01-29T22:50:41","modified_gmt":"2025-01-29T19:50:41","slug":"cve-2024-57376-buffer-overflow-in-d-link-dsr-routers-allows-remote-code-execution","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2024-57376-buffer-overflow-in-d-link-dsr-routers-allows-remote-code-execution\/","title":{"rendered":"CVE-2024-57376 &#8211; &#8220;Buffer Overflow in D-Link DSR Routers Allows Remote Code Execution&#8221;"},"content":{"rendered":"<p class=\"card-text\"> The following table lists the changes that have been made to the <code>CVE-2024-57376<\/code> vulnerability over time. <\/p>\n<p class=\"card-text\"> Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability&#8217;s severity, exploitability, or other characteristics. <\/p>\n<div class=\"p-3 \">\n<ul class=\"acitivity-timeline-2 list-unstyled mb-0\">\n<li>\n<h6 class=\"fs-14\">CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0<\/h6>\n<p>Jan. 29, 2025<\/p>\n<div class=\"table-responsive\">\n<table class=\"table table-responsive table-bordered table-hover table-condensed\">\n<thead>\n<tr>\n<th scope=\"col\">Action<\/th>\n<th scope=\"col\">Type<\/th>\n<th scope=\"col\">Old Value<\/th>\n<th scope=\"col\">New Value<\/th>\n<\/tr>\n<\/thead>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td>Added<\/td>\n<td>CVSS V3.1<\/td>\n<td><\/td>\n<td>AV:A\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H<\/td>\n<\/tr>\n<tr>\n<td>Added<\/td>\n<td>CWE<\/td>\n<td><\/td>\n<td>CWE-120<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/li>\n<li>\n<h6 class=\"fs-14\">New CVE Received by <a href=\"https:\/\/cvefeed.io\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"84e7f2e1c4e9edf0f6e1aaebf6e3\" target=\"_blank\" rel=\"noopener\">[email&nbsp;protected]<\/a><\/h6>\n<p>Jan. 28, 2025<\/p>\n<div class=\"table-responsive\">\n<table class=\"table table-responsive table-bordered table-hover table-condensed\">\n<thead>\n<tr>\n<th scope=\"col\">Action<\/th>\n<th scope=\"col\">Type<\/th>\n<th scope=\"col\">Old Value<\/th>\n<th scope=\"col\">New Value<\/th>\n<\/tr>\n<\/thead>\n<tbody readability=\"5\">\n<tr readability=\"8\">\n<td>Added<\/td>\n<td>Description<\/td>\n<td><\/td>\n<td>Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution.<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>Added<\/td>\n<td>Reference<\/td>\n<td><\/td>\n<td>https:\/\/www.dlink.com\/en\/security-bulletin\/<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The following table lists the changes that have been made to the CVE-2024-57376 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability&#8217;s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Jan. 29, 2025 Action Type &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-60989","post","type-post","status-publish","format-standard","hentry","category-29"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=60989"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60989\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=60989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=60989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=60989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}