cve/2024/CVE-2024-0717.md
2025-09-29 21:09:30 +02:00

63 lines
5.8 KiB
Markdown

### [CVE-2024-0717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0717)
![](https://img.shields.io/static/v1?label=Product&message=DAP-1360&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-1210&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-1260&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-2150&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-300&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-615&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-615GF&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-615S&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-615T&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-620&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-620S&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-806A&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-815&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-815AC&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-815S&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-816&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-820&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-822&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-825&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-825AC&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-825ACF&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-825ACG1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-841&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-842&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-842S&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-843&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-853&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-878&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-882&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-X1530&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-X1860&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DSL-224&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DSL-245GR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DSL-2640U&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DSL-2750U&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DSL-G2452GR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DVG-5402G&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DVG-5402GFRU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DVG-N5402G&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DVG-N5402G-IL&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DWM-312W&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DWM-321&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DWR-921&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DWR-953&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Good%20Line%20Router%20v2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=20240112%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Disclosure&color=brightgreen)
### Description
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability.
In D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 bis 20240112 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /devinfo der Komponente HTTP GET Request Handler. Mittels dem Manipulieren des Arguments area mit der Eingabe notice|net|version mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
### POC
#### Reference
- https://vuldb.com/?id.251542
#### Github
- https://github.com/ARPSyndicate/cve-scores