Описание
An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.30b08 (включая)
Одновременно
cpe:2.3:o:dlink:dir-878_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-878:ax:*:*:*:*:*:*:*
EPSS
Процентиль: 67%
0.00547
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-787
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication.
EPSS
Процентиль: 67%
0.00547
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-787