| Title | D-Link DIR-825m V1.1.12 Buffer Overflow |
|---|
| Description | [cite_start]During a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formPingDiagnosticRun” endpoint. [cite_start]The vulnerability is located within the sub_41F18C function, which calls the sub_41F0C8 function. [cite_start]This function uses the sprintf function to parse the “host” parameter from an incoming request. [cite_start]Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "host" parameter to overwrite the program's stack. [cite_start]This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server. |
|---|
| Source | ⚠️ https://github.com/LX-LX88/cve/issues/18 |
|---|
| User | LX-LX (UID 91683) |
|---|
| Submission | 11/09/2025 01:03 PM (3 months ago) |
|---|
| Moderation | 11/17/2025 03:16 PM (8 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 332644 [D-Link DWR-M920/DWR-M921/DWR-M960/DWR-M961/DIR-825M 1.01.07/1.1.47 formPingDiagnosticRun host buffer overflow] |
|---|
| Points | 0 |
|---|