| Title | D-Link DWR-M920 v1.1.50 Buffer Overflow |
|---|
| Description | [cite_start]During a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formDdns” endpoint. [cite_start]The vulnerability is located within the sub_463560 function. This function uses the strcpy function to parse the “submit-url” parameter from an incoming request. Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "submit-url" parameter to overwrite the program's stack. [cite_start]This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server. |
|---|
| Source | ⚠️ https://github.com/QIU-DIE/CVE/issues/42 |
|---|
| User | LINXI666 (UID 91556) |
|---|
| Submission | 11/14/2025 07:48 (5 months ago) |
|---|
| Moderation | 11/22/2025 16:08 (8 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 333314 [D-Link DIR-822K/DWR-M920 1.00_20250513164613/1.1.50 /boafrm/formDdns submit-url memory corruption] |
|---|
| Points | 0 |
|---|