Dlink_DIR-513_Buffer_Overflow_Vulnerability.md

Post Reply
Shane1145
Posts: 1624
Joined: Wed Sep 25, 2024 2:31 pm

Dlink_DIR-513_Buffer_Overflow_Vulnerability.md

Post by Shane1145 »

Vulnerability Description: Dlink DIR-513 uses the boa program to provide web service. This program initializes services via the websAspInit function, setting several callback APIs. When a POST request is made to /goform/formSetWanDhcpplus, it triggers the formSetWanDhcpplus callback function. The function extracts the curTime parameter from the request body and concatenates it into a stack variable using sprintf(v68, "%s?t=%s", last_url, Var);. Since the length of curTime is not properly checked, it can overflow the stack and cause a denial of service. This vulnerability can be further exploited to gain shell access to the device.

https://github.com/LYN1ng/D-linkdir513/ ... ability.md
Post Reply