Stack Buffer Overflow Vulnerability in D-Link DI-8003 Router
CVE-2024-11047

9.8CRITICAL

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
10 November 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The D-Link DI-8003 router, specifically firmware version 16.07.16A1, contains a critical vulnerability involving a stack-based buffer overflow in the upgrade_filter_asp function located in the /upgrade_filter.asp file. This vulnerability is triggered through improper handling of the 'path' argument, which can be exploited by remote attackers to execute arbitrary code or cause denial-of-service conditions. The vulnerability is publicly disclosed and poses significant risks due to its remote exploitability, underscoring the need for immediate attention and remediation by affected users.

Affected Version(s)

DI-8003 16.07.16A1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

theRaz0r (VulDB User)
.