{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T23:09:58.137","vulnerabilities":[{"cve":{"id":"CVE-2024-45694","sourceIdentifier":"twcert@cert.org.tw","published":"2024-09-16T07:15:02.610","lastModified":"2024-09-17T18:40:07.243","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device."},{"lang":"es","value":"El servicio web de ciertos modelos de enrutadores inalámbricos D-Link contiene una vulnerabilidad de desbordamiento de búfer basada en pila, que permite a atacantes remotos no autenticados explotar esta vulnerabilidad para ejecutar código arbitrario en el dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"twcert@cert.org.tw","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"twcert@cert.org.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-x5460_firmware:1.01:*:*:*:*:*:*:*","matchCriteriaId":"41DB57EF-B020-4B06-A725-C568F7F4C8FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-x5460_firmware:1.02:*:*:*:*:*:*:*","matchCriteriaId":"1D95B7A3-E5E1-4553-AF4C-777843D43BA6"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-x5460_firmware:1.04:*:*:*:*:*:*:*","matchCriteriaId":"E96AFAF8-4617-4AC9-AE3D-871A789F4018"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-x5460_firmware:1.10:*:*:*:*:*:*:*","matchCriteriaId":"67D9078D-7B51-4FD3-BAE3-2B20822DF7E3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-x5460:a1:*:*:*:*:*:*:*","matchCriteriaId":"2A276652-CC92-4DBB-8EA8-DF8E6797C794"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*","matchCriteriaId":"6E8E188F-287F-4F63-BA73-7B7D666607BB"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*","matchCriteriaId":"9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*","matchCriteriaId":"8497D176-6D8B-41BC-B377-0963EF6C24B2"}]}]}],"references":[{"url":"https://www.twcert.org.tw/en/cp-139-8081-3fb39-2.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]},{"url":"https://www.twcert.org.tw/tw/cp-132-8080-7f494-1.html","source":"twcert@cert.org.tw","tags":["Third Party Advisory"]}]}}]}