An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'read' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'read <node_name>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code.
References
Link | Resource |
---|---|
https://github.com/kgsdy/D-Link-DSL-3782-EU | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Apr 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:* |
Information
Published : 2018-05-03 16:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-10713
Mitre link : CVE-2018-10713
CVE.ORG link : CVE-2018-10713
JSON object : View
Products Affected
dlink
- dsl-3782
d-link
- dsl-3782_firmware
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer