Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2005-4723
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
D-Link DI-524 Wireless Router, DI-624 Wireless Router, and DI-784 allow remote attackers to cause a denial of service (device reboot) via a series of crafted fragmented UDP packets, possibly involving a missing fragment.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多个D-Link产品IP报文重组拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
D-Link是台湾友讯集团所创立的网络公司,致力于局域网、宽带网、无线网、语音网及相关网络设备的研发、生产和行销。 D-Link的多个无线接入路由器存在拒绝服务漏洞,远程攻击者可能利用此漏洞对设备进行拒绝服务攻击。 如果攻击者发送3个连续的如下碎片UDP报文的话就会导致设备重启: 所有报文的IP首部中必须有相同的Identification Number。 报文1: 必须将MORE_FRAGMENTS标记位设置为1(IP_MF) 碎片偏移=0 报文的有效部分大小为8个字节。攻击代码中使用了空字节。 报文2
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2005-4723
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2005-4723
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2005-4723

No comments yet


Leave a comment