提交 #643446: D-Link DI-8400 16.07.26A1 Stack-based Buffer Overflow信息

标题D-Link DI-8400 16.07.26A1 Stack-based Buffer Overflow
描述A stack buffer overflow vulnerability exists in the jhttpd HTTP server of the D-Link DI-8400 router (firmware version 16.07.26A1), located in the yyxz_dlink_asp function (handling requests to the /yyxz.asp endpoint). Attackers can trigger a stack buffer overflow by passing an overly long string to the id parameter, potentially enabling arbitrary code execution, unauthorized device control, sensitive information theft, or denial-of-service attacks.
来源⚠️ https://github.com/ZZ2266/.github.io/tree/main/Dlink/DI-8400/yyxz.asp
用户
 n0ps1ed (UID 88889)
提交2025-08-28 18時48分 (8 月前)
管理2025-09-03 13時42分 (6 days later)
状态已接受
VulDB条目322340 [D-Link DI-8400 16.07.26A1 /yyxz.asp yyxz_dlink_asp 标识符 内存损坏]
积分20

Interested in the pricing of exploits?

See the underground prices here!