Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L 1.08B04 and DIR-895 L/R 1.13b03. The impact is: execute arbitrary code (remote). The component is: htdocs/fileaccess.cgi. The attack vector is: A crafted HTTP request handled by fileacces.cgi could allow an attacker to mount a ROP attack: if the HTTP header field CONTENT_TYPE starts with ''boundary=' followed by more than 256 characters, a buffer overflow would be triggered, potentially causing code execution.
References
Link | Resource |
---|---|
https://github.com/badnack/d_link_880_bug/blob/master/README.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2019-10-14 18:15
Updated : 2024-02-28 17:28
NVD link : CVE-2017-14948
Mitre link : CVE-2017-14948
CVE.ORG link : CVE-2017-14948
JSON object : View
Products Affected
dlink
- dir-895r
- dir-885l_firmware
- dir-895l
- dir-880l_firmware
- dir-885l
- dir-868l_firmware
- dir-868l
- dir-895l_firmware
- dir-890l_firmware
- dir-895r_firmware
- dir-890l
- dir-880l
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')