9.8
CVE-2022-37055
- EPSS 69.76%
- Veröffentlicht 28.08.2022 17:15:08
- Zuletzt bearbeitet 10.12.2025 02:00:02
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main,
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dlink ≫ Go-rt-ac750 Firmware Version2.00b02
Dlink ≫ Go-rt-ac750 Firmware Version1.01b03
08.12.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
D-Link Routers Buffer Overflow Vulnerability
SchwachstelleD-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 69.76% | 0.986 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.