Aaron Portnoy and Keefe Johnson has reported a vulnerability in D-Link Wireless Access Point, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the handling of fragmented UDP packets. This may be exploited to cause the device to terminate connections or reboot via certain specially crafted UDP packets.
The vulnerability has been reported in the following products:
* D-Link DI-524 Wireless Router (firmware version 3.20 August 18, 2005).
* D-Link DI-624 Wireless Router.
* D-Link DI-784.
Solution: The vulnerability has reportedly been fixed in the latest firmware.
Provided and/or discovered by: Aaron Portnoy and Keefe Johnson
Original Advisory: http://www.thunkers.net/~deft/advisories/dlink_udp_dos.txt
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: D-Link Wireless Access Point Denial of Service Vulnerability
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.