Search Results (4153 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-48712 1 Tp-link 2 Tl-wdr7660, Tl-wdr7660 Firmware 2025-05-21 6.5 Medium
In TP-Link TL-WDR7660 1.0, the rtRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
CVE-2024-48713 1 Tp-link 2 Tl-wdr7660, Tl-wdr7660 Firmware 2025-05-21 6.5 Medium
In TP-Link TL-WDR7660 1.0, the wacWhitelistJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
CVE-2024-48714 1 Tp-link 2 Tl-wdr7660, Tl-wdr7660 Firmware 2025-05-21 6.5 Medium
In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
CVE-2024-52013 1 Netgear 9 R6400 Firmware, R6400v2, R6400v2 Firmware and 6 more 2025-05-21 5.7 Medium
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at wiz_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-52014 1 Netgear 9 R6400 Firmware, R6400v2, R6400v2 Firmware and 6 more 2025-05-21 5.7 Medium
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at genie_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-52015 1 Netgear 9 R6400 Firmware, R6400v2, R6400v2 Firmware and 6 more 2025-05-21 5.7 Medium
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to contain a stack overflow via the pptp_user_ip parameter at bsw_pptp.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-52016 1 Netgear 9 R6400 Firmware, R6400v2, R6400v2 Firmware and 6 more 2025-05-21 5.7 Medium
Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were discovered to multiple stack overflow vulnerabilities in the component wlg_adv.cgi via the apmode_dns1_pri and apmode_dns1_sec parameters. These vulnerabilities allow attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-51011 1 Netgear 7 R6400 Firmware, R6400v2, R6400v2 Firmware and 4 more 2025-05-21 5.7 Medium
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at pppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-52023 1 Netgear 7 R6400 Firmware, R6400v2, R6400v2 Firmware and 4 more 2025-05-21 5.7 Medium
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at pppoe2.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-52024 1 Netgear 7 R6400 Firmware, R6400v2, R6400v2 Firmware and 4 more 2025-05-21 5.7 Medium
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at wizpppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-52025 1 Netgear 7 R6400 Firmware, R6400v2, R6400v2 Firmware and 4 more 2025-05-21 5.7 Medium
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at geniepppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-52026 1 Netgear 6 R6400v2, R6400v2 Firmware, R7000p and 3 more 2025-05-21 5.7 Medium
Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to contain a stack overflow via the pppoe_localip parameter at bsw_pppoe.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-56914 1 Dlink 2 Dsl-3782, Dsl-3782 Firmware 2025-05-21 5.7 Medium
D-Link DSL-3782 v1.01 is vulnerable to Buffer Overflow in /New_GUI/ParentalControl.asp.
CVE-2024-37607 1 Dlink 2 Dap-2555, Dap-2555 Firmware 2025-05-21 6.5 Medium
A Buffer overflow vulnerability in D-Link DAP-2555 REVA_FIRMWARE_1.20 allows remote attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
CVE-2024-37606 1 Dlink 2 Dcs-932l, Dcs-932l Firmware 2025-05-21 6.5 Medium
A Stack overflow vulnerability in D-Link DCS-932L REVB_FIRMWARE_2.18.01 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
CVE-2024-33773 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-05-21 6.5 Medium
A buffer overflow vulnerability in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 via formWlanGuestSetup allows remote authenticated users to trigger a denial of service (DoS) through the parameter "webpage."
CVE-2024-33771 1 Dlink 2 Dir-619l, Dir-619l Firmware 2025-05-21 6.5 Medium
A buffer overflow vulnerability in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 via goform/formWPS, allows remote authenticated users to trigger a denial of service (DoS) through the parameter "webpage."
CVE-2023-52733 1 Linux 1 Linux Kernel 2025-05-21 7.8 High
In the Linux kernel, the following vulnerability has been resolved: s390/decompressor: specify __decompress() buf len to avoid overflow Historically calls to __decompress() didn't specify "out_len" parameter on many architectures including s390, expecting that no writes beyond uncompressed kernel image are performed. This has changed since commit 2aa14b1ab2c4 ("zstd: import usptream v1.5.2") which includes zstd library commit 6a7ede3dfccb ("Reduce size of dctx by reutilizing dst buffer (#2751)"). Now zstd decompression code might store literal buffer in the unwritten portion of the destination buffer. Since "out_len" is not set, it is considered to be unlimited and hence free to use for optimization needs. On s390 this might corrupt initrd or ipl report which are often placed right after the decompressor buffer. Luckily the size of uncompressed kernel image is already known to the decompressor, so to avoid the problem simply specify it in the "out_len" parameter.
CVE-2024-48150 2 D-link, Dlink 3 Dir-820l, Dir-820l, Dir-820l Firmware 2025-05-21 9.8 Critical
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_451208 function.
CVE-2025-4149 1 Netgear 2 Ex6200, Ex6200 Firmware 2025-05-19 8.8 High
A vulnerability was found in Netgear EX6200 1.0.3.94. It has been classified as critical. This affects the function sub_54014. The manipulation of the argument host leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.