Логотип exploitDog
bind:CVE-2025-60679
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-60679

Количество 3

Количество 3

nvd логотип

CVE-2025-60679

3 месяца назад

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes triggers a stack buffer overflow, allowing an attacker who can control /proc/version content to potentially execute arbitrary code on the device.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-xhj4-39f6-qqcq

3 месяца назад

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes triggers a stack buffer overflow, allowing an attacker who can control /proc/version content to potentially execute arbitrary code on the device.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-14838

3 месяца назад

Уязвимость микропрограммного обеспечения маршрутизаторов D-link DIR-816A2, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-60679

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes triggers a stack buffer overflow, allowing an attacker who can control /proc/version content to potentially execute arbitrary code on the device.

CVSS3: 8.8
0%
Низкий
3 месяца назад
github логотип
GHSA-xhj4-39f6-qqcq

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes triggers a stack buffer overflow, allowing an attacker who can control /proc/version content to potentially execute arbitrary code on the device.

CVSS3: 8.8
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14838

Уязвимость микропрограммного обеспечения маршрутизаторов D-link DIR-816A2, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
3 месяца назад

Уязвимостей на страницу