An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'get' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'get <node_name attr>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code.
References
Link | Resource |
---|---|
https://github.com/kgsdy/D-Link-DSL-3782-EU/blob/master/get.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Apr 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:dlink:dsl-3782:-:*:*:*:*:*:*:* |
Information
Published : 2018-05-04 18:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-10746
Mitre link : CVE-2018-10746
CVE.ORG link : CVE-2018-10746
JSON object : View
Products Affected
dlink
- dsl-3782
d-link
- dsl-3782_firmware
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer