Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.128077
Category:General
Title:D-Link DIR-619L <= 2.06 Multiple Buffer Overflow Vulnerabilities (Nov 2024)
Summary:D-Link DIR-619L devices are prone to multiple buffer overflow; vulnerabilities.
Description:Summary:
D-Link DIR-619L devices are prone to multiple buffer overflow
vulnerabilities.

Vulnerability Insight:
The following vulnerabilities exist:

- CVE-2024-33771: Buffer overflow via goform/formWPS

- CVE-2024-33772: Buffer overflow via formTcpipSetup

- CVE-2024-33773: Buffer overflow via formWlanGuestSetup

- CVE-2024-33774: Buffer overflow via formWlanSetup_Wizard

- CVE-2024-9908: Buffer overflow via formSetMACFilter

- CVE-2024-9909: Buffer overflow via formSetMuti

- CVE-2024-9910: Buffer overflow via formSetPassword

- CVE-2024-9911: Buffer overflow via formSetPortTr

- CVE-2024-9912: Buffer overflow via formSetQoS

- CVE-2024-9913: Buffer overflow via formSetRoute

- CVE-2024-9914: Buffer overflow via formSetWizardSelectMode

- CVE-2024-9915: Buffer overflow via formVirtualServ

- CVE-2024-9566: Buffer overflow via formDeviceReboot

- CVE-2024-9567: Buffer overflow via formAdvFirewall

- CVE-2024-9568: Buffer overflow via formAdvNetwork

- CVE-2024-9569: Buffer overflow via formEasySetPassword

- CVE-2024-9570: Buffer overflow via formEasySetTimezone

- CVE-2024-9782: Buffer overflow via formEasySetupWWConfig

- CVE-2024-9783: Buffer overflow via formLogDnsquery

- CVE-2024-9784: Buffer overflow via formResetStatistic

- CVE-2024-9785: Buffer overflow via formSetDDNS

- CVE-2024-9786: Buffer overflow via formSetLog

Affected Software/OS:
D-Link DIR-619L devices through firmware version 2.06.

Solution:
No solution was made available by the vendor. General solution
options are to upgrade to a newer release, disable respective features, remove the product or
replace the product by another one.

Note: Vendor states that the model reached its End-of-Support Date, is no longer
supported, and firmware development has ceased.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-33771
Common Vulnerability Exposure (CVE) ID: CVE-2024-33772
Common Vulnerability Exposure (CVE) ID: CVE-2024-33773
Common Vulnerability Exposure (CVE) ID: CVE-2024-33774
Common Vulnerability Exposure (CVE) ID: CVE-2024-9908
Common Vulnerability Exposure (CVE) ID: CVE-2024-9909
Common Vulnerability Exposure (CVE) ID: CVE-2024-9910
Common Vulnerability Exposure (CVE) ID: CVE-2024-9911
Common Vulnerability Exposure (CVE) ID: CVE-2024-9912
Common Vulnerability Exposure (CVE) ID: CVE-2024-9913
Common Vulnerability Exposure (CVE) ID: CVE-2024-9914
Common Vulnerability Exposure (CVE) ID: CVE-2024-9915
Common Vulnerability Exposure (CVE) ID: CVE-2024-9566
Common Vulnerability Exposure (CVE) ID: CVE-2024-9567
Common Vulnerability Exposure (CVE) ID: CVE-2024-9568
Common Vulnerability Exposure (CVE) ID: CVE-2024-9569
Common Vulnerability Exposure (CVE) ID: CVE-2024-9570
Common Vulnerability Exposure (CVE) ID: CVE-2024-9782
Common Vulnerability Exposure (CVE) ID: CVE-2024-9783
Common Vulnerability Exposure (CVE) ID: CVE-2024-9784
Common Vulnerability Exposure (CVE) ID: CVE-2024-9785
Common Vulnerability Exposure (CVE) ID: CVE-2024-9786
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.