Отправить #780439: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer OverflowИнформация

НазваниеD-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/326/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Stack-based Buffer Overflow
ОписаниеWe found an stack overflow vulnerability in D-Link Technology NAS device with firmware which was released recently, allows remote attackers to crash the server.In cgi_addgroup_get_group_quota_minsize function, name is directly passed by the attacker, If this part of the data is too long, it will cause the stack overflow, so we can control the name to execute arbitrary code.
Источник⚠️ https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_169/169.md
Пользователь
 Ziyue Xie (UID 89123)
Представление15.03.2026 14:39 (22 дни назад)
Модерация31.03.2026 12:30 (16 days later)
Статуспринято
Запись VulDB354349 [D-Link DNS-1550-04 до 20260205 /cgi-bin/account_mgr.cgi cgi_addgroup_get_group_quota_minsize Имя повреждение памяти]
Баллы20

Interested in the pricing of exploits?

See the underground prices here!