إرسال #607311: D-Link DI-500WF DI 500WF-17.04.10A1T Stack-based Buffer Overflowالمعلومات

عنوانD-Link DI-500WF DI 500WF-17.04.10A1T Stack-based Buffer Overflow
الوصفDuring security analysis of the D-Link DI-500WF firmware, a critical stack buffer overflow was discovered in the ip_position.asp interface. The vulnerability stems from improper handling of the 'ip' parameter in HTTP GET requests. The vulnerable function fails to validate the length of user-supplied input before copying it to a fixed-size stack buffer using sprintf(). This allows attackers to overwrite the return address and potentially control program execution flow.
المصدر⚠️ https://github.com/BigMancer/CVE/issues/1
المستخدم
 BluesCat (UID 87333)
ارسال01/07/2025 04:09 PM (10 أشهر منذ)
الاعتدال07/07/2025 10:42 AM (6 days later)
الحالةتمت الموافقة
إدخال VulDB315133 [D-Link DI-500WF 17.04.10A1T jhttpd ip_position.asp sprintf ip تلف الذاكرة]
النقاط20

Want to know what is going to be exploited?

We predict KEV entries!