### [CVE-2024-9515](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9515) ![](https://img.shields.io/static/v1?label=Product&message=DIR-605L&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202.13B01%20BETA%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Buffer%20Overflow&color=brighgreen) ### Description A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. This affects the function formSetQoS of the file /goform/formSetQoS. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. ### POC #### Reference - https://github.com/noahze01/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetQoS.md #### Github No PoCs found on GitHub currently.