Stack-Based Buffer Overflow Vulnerability in D-Link DIR-825 Rev.B 2.10
CVE-2020-10214

8.8HIGH

Key Information:

Vendor
D-Link
Vendor
CVE Published:
7 March 2020

Summary

A stack-based buffer overflow vulnerability exists in the httpd binary of D-Link DIR-825 Rev.B 2.10 devices. This security flaw can be exploited by an authenticated user through a crafted POST request to ntp_sync.cgi, specifically by providing a parameter 'ntp_server' that exceeds the expected length. If exploited, this vulnerability may allow the execution of arbitrary code on the affected device, potentially compromising its functionality and security.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.