| Название | D-Link DIR-513 1.10 Buffer Overflow |
|---|
| Описание | The DIR-513 device utilizes the boa program to provide web services. The program initializes through the websAspInitfunction, which sets up a series of callback APIs. A POST request to the /goform/formSetWanPPTPpath triggers the formSetWanPPTPcallback function. This function retrieves the curTimeparameter from the request body, which is subsequently processed in the sprintf(v12, "%s?t=%s", last_url, Var);statement, where it gets concatenated into a stack variable. Due to the lack of length validation for curTime, an excessively long input can trigger a stack overflow vulnerability, leading to denial of service. Further exploitation could allow attackers to gain shell access. |
|---|
| Источник | ⚠️ https://github.com/InfiniteLin/Lin-s-CVEdb/blob/main/DIR-513/formSetWanPPPoE.md |
|---|
| Пользователь | AttackingLin (UID 88138) |
|---|
| Представление | 22.07.2025 16:59 (9 месяцы назад) |
|---|
| Модерация | 25.07.2025 09:32 (3 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 317583 [D-Link DIR-513 1.10 HTTP POST Request formSetWanPPTPpath formSetWanPPTPcallback curTime повреждение памяти] |
|---|
| Баллы | 20 |
|---|