CVE-2019-9125

An issue was discovered on D-Link DIR-878 1.12B01 devices. Because strncpy is misused, there is a stack-based buffer overflow vulnerability that does not require authentication via the HNAP_AUTH HTTP header.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:d-link:dir-878_firmware:1.12b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:51

Type Values Removed Values Added
References () https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow1.md - Exploit, Third Party Advisory () https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow1.md - Exploit, Third Party Advisory
References () https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow2.md - Exploit, Third Party Advisory () https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow2.md - Exploit, Third Party Advisory

Information

Published : 2019-02-25 05:29

Updated : 2024-11-21 04:51


NVD link : CVE-2019-9125

Mitre link : CVE-2019-9125

CVE.ORG link : CVE-2019-9125


JSON object : View

Products Affected

d-link

  • dir-878_firmware

dlink

  • dir-878
CWE
CWE-306

Missing Authentication for Critical Function

CWE-787

Out-of-bounds Write