### [CVE-2024-11959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11959) ![](https://img.shields.io/static/v1?label=Product&message=DIR-605L&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202.13B01%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Buffer%20Overflow&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Memory%20Corruption&color=brighgreen) ### Description ** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### POC #### Reference No PoCs from references. #### Github - https://github.com/offshore0315/loT-vulnerable