Stack-Based Buffer Overflow Vulnerability in D-Link Router
CVE-2018-17067
9.8CRITICAL
Summary
A stack-based buffer overflow vulnerability exists in D-Link DIR-816 A2 1.10 B05 devices. An insufficient validation of input length in the password field of the /goform/formLogin interface allows an attacker to exploit this flaw. By submitting an excessively long password, an unauthorized user could potentially overwrite critical memory addresses, leading to arbitrary code execution and compromising the device's integrity.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved