Логотип exploitDog
bind:CVE-2019-17146
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-17146

Количество 3

Количество 3

nvd логотип

CVE-2019-17146

около 6 лет назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link DCS-960L v1.07.102. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the SOAPAction request header, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-8458.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-wvw6-w9qq-28x5

больше 3 лет назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link DCS-960L v1.07.102. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the SOAPAction request header, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-8458.

EPSS: Средний
fstec логотип

BDU:2020-00796

около 6 лет назад

Уязвимость службы HNAP микропрограммного обеспечения Wi-Fi камер D-Link серии DCS, позволяющая нарушителю выполнить произвольный код в целевом устройстве

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-17146

This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link DCS-960L v1.07.102. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the SOAPAction request header, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-8458.

CVSS3: 9.8
18%
Средний
около 6 лет назад
github логотип
GHSA-wvw6-w9qq-28x5

This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link DCS-960L v1.07.102. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HNAP service, which listens on TCP port 80 by default. When parsing the SOAPAction request header, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-8458.

18%
Средний
больше 3 лет назад
fstec логотип
BDU:2020-00796

Уязвимость службы HNAP микропрограммного обеспечения Wi-Fi камер D-Link серии DCS, позволяющая нарушителю выполнить произвольный код в целевом устройстве

CVSS3: 9.8
18%
Средний
около 6 лет назад

Уязвимостей на страницу