| عنوان | D-Link DI-8400 16.07.26A1 Stack-based Buffer Overflow |
|---|
| الوصف | A stack buffer overflow vulnerability exists in the jhttpd HTTP server of the D-Link DI-8400 router (firmware version 16.07.26A1), located in the yyxz_dlink_asp function (handling requests to the /yyxz.asp endpoint). Attackers can trigger a stack buffer overflow by passing an overly long string to the id parameter, potentially enabling arbitrary code execution, unauthorized device control, sensitive information theft, or denial-of-service attacks. |
|---|
| المصدر | ⚠️ https://github.com/ZZ2266/.github.io/tree/main/Dlink/DI-8400/yyxz.asp |
|---|
| المستخدم | n0ps1ed (UID 88889) |
|---|
| ارسال | 28/08/2025 06:48 PM (8 أشهر منذ) |
|---|
| الاعتدال | 03/09/2025 01:42 PM (6 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 322340 [D-Link DI-8400 16.07.26A1 /yyxz.asp yyxz_dlink_asp معرف تلف الذاكرة] |
|---|
| النقاط | 20 |
|---|