Súbít #597419: D-Link DIR619L 2.06B01 Stack-based Buffer Overflowbayani

KuraD-Link DIR619L 2.06B01 Stack-based Buffer Overflow
GaskiyaWe found an stack overflow vulnerability in D-Link router with firmware which was released recently, allows remote attackers to crash the server. In the router's formSetMuti function, rsPassword1_%d、wpaPSK_%d、wep128Key4_%d、wep128Key3_%d、wep128Key2_%d、wep128Key1_%d、wep64Key4_%d、wep64Key3_%d、wep64Key2_%d、wep64Key1_%d、ssid_%d is directly passed by the attacker, If this part of the data is too long, it will cause the stack overflow, so we can control the rsPassword1_%d、wpaPSK_%d、wep128Key4_%d、wep128Key3_%d、wep128Key2_%d、wep128Key1_%d、wep64Key4_%d、wep64Key3_%d、wep64Key2_%d、wep64Key1_%d、ssid_%d to execute arbitrary code.
Manga⚠️ https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_66/66.md
Màdùmga
 pjq123 (UID 86618)
Furta06/16/2025 03:48 (8 Wurɗi 전)
Gargajiya06/19/2025 15:38 (3 days later)
HalittaDublikat
VulDB gite280237 [D-Link DIR-619L B1 2.06 /goform/formSetMuti curTime Pufferüberlauf]
Nganji0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!