Enviar #773566: D-Link DIR-513 1.10 Buffer Overflowinformación

TítuloD-Link DIR-513 1.10 Buffer Overflow
DescripciónD-Link DIR-513 (Firmware versions A1FW110 and A2FW110) is susceptible to a Stack-based Buffer Overflow vulnerability within its integrated Web server. The issue resides in the network service program's formEasySetPassword function (located at address 0x4439b4). The vulnerability is triggered when the application processes an HTTP POST request containing a user-controlled curTime parameter. The program utilizes the websGetVar function to retrieve this parameter without implementing any length validation. If the language parameter in the same request is set to a value other than "SC" or "TW", the execution flow enters a logic branch where the unsanitized curTime string is passed to an unbounded sprintf function. This function attempts to concatenate the input into a fixed-size stack buffer (v11) of 104 bytes. Because there is no boundary checking, an attacker can provide a specially crafted, overlong curTime string to overflow the buffer and overwrite the saved function return address on the stack (positioned approximately 172 bytes from the buffer start). Successful exploitation of this vulnerability allows a remote, unauthenticated attacker to cause a Denial of Service (DoS) by crashing the device service or to achieve Remote Code Execution (RCE) with elevated privileges by controlling the instruction pointer.
Fuente⚠️ https://github.com/InfiniteLin/Lin-s-CVEdb/tree/main/DIR-513/formEasySetupWizard3
Usuario
 AttackingLin (UID 88138)
Sumisión2026-03-06 04:09 (hace 1 mes)
Moderación2026-03-20 09:26 (14 days later)
EstadoDuplicado
Entrada de VulDB352009 [D-Link DIR-513 1.10 Web Service formEasySetPassword curTime desbordamiento de búfer]
Puntos0

Interested in the pricing of exploits?

See the underground prices here!