Логотип exploitDog
bind:CVE-2019-10892
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10892

Количество 2

Количество 2

nvd логотип

CVE-2019-10892

больше 6 лет назад

An issue was discovered in D-Link DIR-806 devices. There is a stack-based buffer overflow in function hnap_main at /htdocs/cgibin. The function will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by users. And it finally leads to a stack-based buffer overflow via a special HTTP header.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4xmx-7cpg-77rh

больше 3 лет назад

hnap_main in /htdocs/cgibin on D-link DIR-806 v1.0 devices has a stack-based buffer overflow via a long HTTP header that has "SOAPAction: http://purenetworks.com/HNAP1/GetDeviceSettings/" at the beginning.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-10892

An issue was discovered in D-Link DIR-806 devices. There is a stack-based buffer overflow in function hnap_main at /htdocs/cgibin. The function will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by users. And it finally leads to a stack-based buffer overflow via a special HTTP header.

CVSS3: 9.8
1%
Низкий
больше 6 лет назад
github логотип
GHSA-4xmx-7cpg-77rh

hnap_main in /htdocs/cgibin on D-link DIR-806 v1.0 devices has a stack-based buffer overflow via a long HTTP header that has "SOAPAction: http://purenetworks.com/HNAP1/GetDeviceSettings/" at the beginning.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу