Dlink_DIR-513_Buffer_Overflow_Vulnerability.md
Posted: Wed Jul 23, 2025 12:25 am
Vulnerability Description: Dlink DIR-513 uses the boa program to provide web service. This program initializes services via the websAspInit function, setting several callback APIs. When a POST request is made to /goform/formSetWanDhcpplus, it triggers the formSetWanDhcpplus callback function. The function extracts the curTime parameter from the request body and concatenates it into a stack variable using sprintf(v68, "%s?t=%s", last_url, Var);. Since the length of curTime is not properly checked, it can overflow the stack and cause a denial of service. This vulnerability can be further exploited to gain shell access to the device.
https://github.com/LYN1ng/D-linkdir513/ ... ability.md
https://github.com/LYN1ng/D-linkdir513/ ... ability.md