Enviar #780439: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflowinformación

TítuloD-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow
DescripciónWe found an stack overflow vulnerability in D-Link Technology NAS device with firmware which was released recently, allows remote attackers to crash the server.In cgi_addgroup_get_group_quota_minsize function, name is directly passed by the attacker, If this part of the data is too long, it will cause the stack overflow, so we can control the name to execute arbitrary code.
Fuente⚠️ https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_169/169.md
Usuario
 Ziyue Xie (UID 89123)
Sumisión2026-03-15 14:39 (hace 18 días)
Moderación2026-03-31 12:30 (16 days later)
EstadoAceptado
Entrada de VulDB354349 [D-Link DNS-1550-04 hasta 20260205 /cgi-bin/account_mgr.cgi cgi_addgroup_get_group_quota_minsize Nombre desbordamiento de búfer]
Puntos20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!