Soumettre #788298: D-Link DIR-645 1.01–1.03 Stack-based Buffer Overflowinformation

TitreD-Link DIR-645 1.01–1.03 Stack-based Buffer Overflow
DescriptionThe D-Link DIR-600 is a wireless router designed for home and small office environments, and it is still deployed in some actual network scenarios. In early firmware versions of the D-Link DIR-645 router (such as v1.01–v1.03), the core function `hedwigcgi_main` of `/cgi-bin/hedwig.cgi` has a stack-based buffer overflow vulnerability. When processing HTTP requests, the program retrieves the user session identifier (Session UID), which can be indirectly controlled by client requests. Then, it uses `sprintf` to concatenate it into a fixed-size stack buffer without performing length checks. If an attacker constructs overly long input, it can cause a stack buffer overflow, overwriting registers and the return address ($ra) on the stack, thereby hijacking the program's execution flow. By carefully crafting the data, an attacker can achieve remote code execution (RCE) and ultimately gain full control of the device.
La source⚠️ https://github.com/Pers1st0/CVE/blob/main/stack-based%20buffer%20overflow%20vulnerability%20exists%20in%20the%20hedwig.cgi%20of%20D-Link%20DIR-645.md
Utilisateur
 Pers1st (UID 96793)
Soumission25/03/2026 13:01 (il y a 1 mois)
Modérer08/04/2026 17:30 (14 days later)
StatutAccepté
Entrée VulDB356263 [D-Link DIR-645 1.01/1.02/1.03 /cgi-bin/hedwig.cgi hedwigcgi_main buffer overflow]
Points20

Want to know what is going to be exploited?

We predict KEV entries!