제출 #626697: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow정보

제목Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow
설명We found an stack overflow vulnerability in Linksys router with firmware which was released recently, allows remote attackers to crash the server.In the router's setDMZ function, DMZIPAddress is directly passed by the attacker, If this part of the data is too long, it will cause the stack overflow, so we can control the DMZIPAddress to execute arbitrary code.
원천⚠️ https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_48/48.md
사용자
 pjq123 (UID 86618)
제출2025. 08. 01. AM 04:40 (9 개월 ago)
모더레이션2025. 08. 10. AM 10:06 (9 days later)
상태수락
VulDB 항목319366 [Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 까지 20250801 /goform/setDMZ DMZIPAddress 메모리 손상]
포인트들18

Do you want to use VulDB in your project?

Use the official API to access entries easily!