DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.forescout.com/resources/draytek14-vulnerabilities | broken link |
https://www.forescout.com/resources/draybreak-draytek-research/ | mitigation third party advisory technical description |