CVE-2018-10713

An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'read' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'read <node_name>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code.
References
Link Resource
https://github.com/kgsdy/D-Link-DSL-3782-EU Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:d-link:dsl-3782_firmware:1.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*

History

26 Apr 2023, 18:55

Type Values Removed Values Added
CPE cpe:2.3:h:d-link:dsl-3782:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:*

Information

Published : 2018-05-03 16:29

Updated : 2024-02-04 19:46


NVD link : CVE-2018-10713

Mitre link : CVE-2018-10713

CVE.ORG link : CVE-2018-10713


JSON object : View

Products Affected

dlink

  • dsl-3782

d-link

  • dsl-3782_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer