An issue was discovered on D-Link DIR-878 1.12B01 devices. Because strncpy is misused, there is a stack-based buffer overflow vulnerability that does not require authentication via the HNAP_AUTH HTTP header.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow2.md | third party advisory exploit |
https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow1.md | third party advisory exploit |