Submit #693784: D-Link DIR-822k TK_1.00_20250513164613 Buffer Overflowinfo

TitleD-Link DIR-822k TK_1.00_20250513164613 Buffer Overflow
DescriptionDuring a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formTracerouteDiagnosticRun” endpoint. The vulnerability is located within the sub_419EF0 function, which calls the sub_419E00 function. This function uses the sprintf function to parse the “host” parameter from an incoming request. Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "host" parameter to overwrite the program's stack. This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server.
Source⚠️ https://github.com/QIU-DIE/CVE/issues/34
User
 hhsw34 (UID 91076)
Submission11/12/2025 10:36 AM (3 months ago)
Moderation11/17/2025 03:18 PM (5 days later)
StatusDuplicate
VulDB entry332645 [D-Link DWR-M920/DWR-M921/DWR-M960/DIR-822K/DIR-825M 1.01.07 formTracerouteDiagnosticRun host buffer overflow]
Points0

Interested in the pricing of exploits?

See the underground prices here!