Stack-Based Buffer Overflow in D-Link DIR-816 A2 Router
CVE-2018-17065
9.8CRITICAL
Summary
A stack-based buffer overflow vulnerability is present in D-Link DIR-816 A2 1.10 B05 devices. The /goform/DDNS route's handler function does not adequately validate the length of user-submitted passwords, allowing attackers to exploit this by inputting an excessively long password. This could result in overwriting the return address, potentially leading to arbitrary code execution or denial of service. Users are advised to review their device configurations and apply necessary updates to mitigate the risk.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved