Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c725-jmgq-pg3j

Опубликовано: 02 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request.

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request.

EPSS

Процентиль: 83%
0.01932
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
около 4 лет назад

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request.

CVSS3: 9.8
fstec
около 5 лет назад

Уязвимость функции FUN_80034d60 (/formStaticDHCP) микропрограммного обеспечения беспроводного маршрутизатора D-Link DIR-809, позволяющая нарушителю выполнить произвольный код в целевой системе

EPSS

Процентиль: 83%
0.01932
Низкий

Дефекты

CWE-787