| Título | D-Link DI-500WF DI 500WF-17.04.10A1T Stack-based Buffer Overflow |
|---|
| Descripción | During security analysis of the D-Link DI-500WF firmware, a critical stack buffer overflow was discovered in the ip_position.asp interface. The vulnerability stems from improper handling of the 'ip' parameter in HTTP GET requests. The vulnerable function fails to validate the length of user-supplied input before copying it to a fixed-size stack buffer using sprintf(). This allows attackers to overwrite the return address and potentially control program execution flow. |
|---|
| Fuente | ⚠️ https://github.com/BigMancer/CVE/issues/1 |
|---|
| Usuario | BluesCat (UID 87333) |
|---|
| Sumisión | 2025-07-01 16:09 (hace 10 meses) |
|---|
| Moderación | 2025-07-07 10:42 (6 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 315133 [D-Link DI-500WF 17.04.10A1T jhttpd ip_position.asp sprintf ip desbordamiento de búfer] |
|---|
| Puntos | 20 |
|---|