Soumettre #691809: D-Link DWR-M960 V1.01.07 Buffer Overflowinformation

TitreD-Link DWR-M960 V1.01.07 Buffer Overflow
DescriptionDuring a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formTracerouteDiagnosticRun” endpoint. The vulnerability is located within the sub_421144 function, which calls the sub_421080 function. This function uses the sprintf function to parse the “host” parameter from an incoming request. Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "host" parameter to overwrite the program's stack. This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server. Immediate remediation is required to mitigate this high-impact risk.
La source⚠️ https://github.com/LX-LX88/cve/issues/12
Utilisateur
 LX-LX (UID 91683)
Soumission09/11/2025 11:35 (il y a 6 mois)
Modérer17/11/2025 15:12 (8 days later)
StatutAccepté
Entrée VulDB332645 [D-Link DWR-M920/DWR-M921/DWR-M960/DIR-822K/DIR-825M 1.01.07 formTracerouteDiagnosticRun host buffer overflow]
Points20

Interested in the pricing of exploits?

See the underground prices here!