{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6580","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-07T13:14:19.386Z","datePublished":"2023-12-07T21:31:05.210Z","dateUpdated":"2024-08-02T08:35:14.765Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-07T21:31:05.210Z"},"title":"D-Link DIR-846 QoS POST deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"CWE-502 Deserialization"}]}],"affected":[{"vendor":"D-Link","product":"DIR-846","versions":[{"version":"FW100A53DBR","status":"affected"}],"modules":["QoS POST Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in D-Link DIR-846 FW100A53DBR. This affects an unknown part of the file /HNAP1/ of the component QoS POST Handler. The manipulation of the argument smartqos_express_devices/smartqos_normal_devices leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in D-Link DIR-846 FW100A53DBR gefunden. Hiervon betroffen ist ein unbekannter Codeblock der Datei /HNAP1/ der Komponente QoS POST Handler. Mit der Manipulation des Arguments smartqos_express_devices/smartqos_normal_devices mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}}],"timeline":[{"time":"2023-07-12T00:00:00.000Z","lang":"en","value":"Exploit disclosed"},{"time":"2023-12-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-07T16:17:26.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Françoa Taffarel","type":"finder"},{"lang":"en","value":"francoa.taffarel (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.247161","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.247161","tags":["signature","permissions-required"]},{"url":"https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:35:14.765Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.247161","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.247161","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md","tags":["exploit","x_transferred"]}]}]}}