Buffer Overflow Vulnerability in D-Link DSL-3782 Router
CVE-2018-10746

8.8HIGH

Key Information:

Vendor
D-link
Vendor
CVE Published:
4 May 2018

Summary

A buffer overflow vulnerability exists in the D-Link DSL-3782 EU 1.01 device, where an authenticated user can exploit a long buffer passed as a 'get' parameter to the '/userfs/bin/tcapi' binary. This issue arises within the Diagnostics component when the 'get <node_name attr>' function is used. The flaw allows for memory corruption, potentially enabling an attacker to redirect program execution flow and execute arbitrary code on the device.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability Reserved

  • Vulnerability published

.