Stack-based buffer overflow in the websRedirect function in GoAhead on D-Link DIR-816 A2 (CN) routers with firmware version 1.10B05 allows unauthenticated remote attackers to execute arbitrary code via a request with a long HTTP Host header.
References
Link | Resource |
---|---|
https://0x3f97.github.io/exploit/2018/05/13/D-Link-DIR-816-A2-CN-router-stack-based-buffer-overflow/ | Exploit Third Party Advisory |
https://0x3f97.github.io/exploit/2018/05/13/D-Link-DIR-816-A2-CN-router-stack-based-buffer-overflow/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://0x3f97.github.io/exploit/2018/05/13/D-Link-DIR-816-A2-CN-router-stack-based-buffer-overflow/ - Exploit, Third Party Advisory |
Information
Published : 2018-05-13 15:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-11013
Mitre link : CVE-2018-11013
CVE.ORG link : CVE-2018-11013
JSON object : View
Products Affected
dlink
- dir-816_a2
d-link
- dir-816_a2_firmware
CWE
CWE-787
Out-of-bounds Write