| Title | D-Link DWR-M921 V1.1.50 Buffer Overflow |
|---|
| Description | During a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formTracerouteDiagnosticRun” endpoint. The vulnerability is located within the sub_4248F0 function, which calls the sub_4195A4 function. This function uses the sprintf function to parse the “host” parameter from an incoming request. Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "host" parameter to overwrite the program's stack. This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server. |
|---|
| Source | ⚠️ https://github.com/QIU-DIE/CVE/issues/38 |
|---|
| User | hhsw34 (UID 91076) |
|---|
| Submission | 11/12/2025 11:06 AM (3 months ago) |
|---|
| Moderation | 11/17/2025 03:18 PM (5 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 332645 [D-Link DWR-M920/DWR-M921/DWR-M960/DIR-822K/DIR-825M 1.01.07 formTracerouteDiagnosticRun host buffer overflow] |
|---|
| Points | 0 |
|---|