Description
An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication.
References
https://www.dlink.com/en/security-bulletin/
Vendor Advisory
https://www.dlink.com/en/security-bulletin/
Vendor Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-02T18:15:13.473Z
5 years agoLast modified
2024-11-21T05:03:17.980Z
1 year ago