A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.dlink.com/en/security-bulletin/ | vendor advisory |
https://github.com/noobexploiter/IOTHACKS/blob/main/vuln1.md | third party advisory exploit |