First published: Fri Aug 25 2017(Updated: )
Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows remote attackers to execute arbitrary code by crafting malformed "Host" and "Referer" header values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dns-322l Firmware | <=2.00b07 | |
Dlink Dns-322l | ||
D-link Dns-320lw Firmware | <=1.03b04 | |
Dlink Dns-320lw | ||
D-link Dnr-326 Firmware | <=1.40b03 | |
Dlink Dnr-326 | ||
D-link Dns-327l Firmware | <=1.02 | |
Dlink Dns-327l | ||
D-link Dnr-320l Firmware | <=1.03b04 | |
Dlink Dnr-320l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.