Submit #691816: D-Link DWR-M920 V1.1.5 Buffer Overflowinfo

TitleD-Link DWR-M920 V1.1.5 Buffer Overflow
Description[cite_start]During a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formTracerouteDiagnosticRun” endpoint. [cite_start]The vulnerability is located within the sub_41E080 function, which calls the sub_41DF84 function. [cite_start]This function uses the sprintf function to parse the “host” parameter from an incoming request. [cite_start]Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "host" parameter to overwrite the program's stack. [cite_start]This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server.
Source⚠️ https://github.com/LX-LX88/cve/issues/16
User
 LX-LX (UID 91683)
Submission11/09/2025 12:25 PM (3 months ago)
Moderation11/17/2025 03:18 PM (8 days later)
StatusDuplicate
VulDB entry332645 [D-Link DWR-M920/DWR-M921/DWR-M960/DIR-822K/DIR-825M 1.01.07 formTracerouteDiagnosticRun host buffer overflow]
Points0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!