| 标题 | D-Link DWR-M920 v1.1.50 Buffer Overflow |
|---|
| 描述 | [cite_start]During a security review of the application, a critical buffer overflow vulnerability was discovered in the “/boafrm/formDdns” endpoint. [cite_start]The vulnerability is located within the sub_463560 function. This function uses the strcpy function to parse the “submit-url” parameter from an incoming request. Due to the lack of proper bounds checking on the input, a malicious actor can supply an oversized "submit-url" parameter to overwrite the program's stack. [cite_start]This can lead to application crashes, memory corruption, and potentially allow for arbitrary code execution on the server. |
|---|
| 来源 | ⚠️ https://github.com/QIU-DIE/CVE/issues/42 |
|---|
| 用户 | LINXI666 (UID 91556) |
|---|
| 提交 | 2025-11-14 07時48分 (5 月前) |
|---|
| 管理 | 2025-11-22 16時08分 (8 days later) |
|---|
| 状态 | 重复 |
|---|
| VulDB条目 | 333314 [D-Link DIR-822K/DWR-M920 1.00_20250513164613/1.1.50 /boafrm/formDdns submit-url 内存损坏] |
|---|
| 积分 | 0 |
|---|