Submit #788298: D-Link DIR-645 1.01–1.03 Stack-based Buffer Overflowinfo

TitelD-Link DIR-645 1.01–1.03 Stack-based Buffer Overflow
BeschreibungThe D-Link DIR-600 is a wireless router designed for home and small office environments, and it is still deployed in some actual network scenarios. In early firmware versions of the D-Link DIR-645 router (such as v1.01–v1.03), the core function `hedwigcgi_main` of `/cgi-bin/hedwig.cgi` has a stack-based buffer overflow vulnerability. When processing HTTP requests, the program retrieves the user session identifier (Session UID), which can be indirectly controlled by client requests. Then, it uses `sprintf` to concatenate it into a fixed-size stack buffer without performing length checks. If an attacker constructs overly long input, it can cause a stack buffer overflow, overwriting registers and the return address ($ra) on the stack, thereby hijacking the program's execution flow. By carefully crafting the data, an attacker can achieve remote code execution (RCE) and ultimately gain full control of the device.
Quelle⚠️ https://github.com/Pers1st0/CVE/blob/main/stack-based%20buffer%20overflow%20vulnerability%20exists%20in%20the%20hedwig.cgi%20of%20D-Link%20DIR-645.md
Benutzer
 Pers1st (UID 96793)
Einreichung25.03.2026 13:01 (vor 16 Tagen)
Moderieren08.04.2026 17:30 (14 days later)
StatusAkzeptiert
VulDB Eintrag356263 [D-Link DIR-645 1.01/1.02/1.03 /cgi-bin/hedwig.cgi hedwigcgi_main Pufferüberlauf]
Punkte20

Do you need the next level of professionalism?

Upgrade your account now!