| Title | D-Link DIR-822k TK_1.00_20250513164613 Buffer Overflow |
|---|
| Description | During a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formTracerouteDiagnosticRun” endpoint. The vulnerability is located within the sub_419EF0 function, which calls the sub_419E00 function. This function uses the sprintf function to parse the “host” parameter from an incoming request. Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "host" parameter to overwrite the program's stack. This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server. |
|---|
| Source | ⚠️ https://github.com/QIU-DIE/CVE/issues/34 |
|---|
| User | hhsw34 (UID 91076) |
|---|
| Submission | 11/12/2025 10:36 AM (3 months ago) |
|---|
| Moderation | 11/17/2025 03:18 PM (5 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 332645 [D-Link DWR-M920/DWR-M921/DWR-M960/DIR-822K/DIR-825M 1.01.07 formTracerouteDiagnosticRun host buffer overflow] |
|---|
| Points | 0 |
|---|