| Title | D-Link DIR-600L 2.07B01 Buffer Overflow |
|---|
| Description | d-link DIR-600L has buffer overflow vulnerability in formSetWanL2TP.The program receives the value of the host field through the websGetVar function,concatenates it into a formatted string using the sprintf function. Since the sprintf lacks the boundary check and the attacker's input length isn't checked either , buffer overflow exists. |
|---|
| Source | ⚠️ https://github.com/jylsec/vuldb/blob/main/D-Link/dlink_dir600l/Buffer_ovrflow-formSetWanL2TP-curTime/README.md |
|---|
| User | B1Nn (UID 84136) |
|---|
| Submission | 04/15/2025 14:11 (12 months ago) |
|---|
| Moderation | 05/05/2025 18:59 (20 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 307466 [D-Link DIR-600L up to 2.07B01 formSetWanL2TP host buffer overflow] |
|---|
| Points | 18 |
|---|