提交 #779123: Belkin F9K1122 1.00.33 Stack-based Buffer Overflow信息

标题Belkin F9K1122 1.00.33 Stack-based Buffer Overflow
描述 A vulnerability was found in Belkin F9K1122 1.00.33 . Affected by this vulnerability is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component webs. The manipulation of the argument webpage with an unknown input leads to a buffer overflow vulnerability.In formCrossBandSwitch function,it reads in a user-provided parameter webpage.And the variable p_reboot_msg is passed to the strcpy function without any length check, which may overflow the stack-based buffer reboot_msg.As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.
来源⚠️ https://github.com/Litengzheng/vul_db/blob/main/Belkin/vul_153/README.md
用户 LtzHuster2 (UID 96397)
提交2026-03-13 02時24分 (25 日前)
管理2026-03-27 17時36分 (15 days later)
状态已接受
VulDB条目353965 [Belkin F9K1122 1.00.33 Parameter formCrossBandSwitch webpage 内存损坏]
积分20

Interested in the pricing of exploits?

See the underground prices here!