First published: Tue Jul 02 2019(Updated: )
An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device has a custom binary called mp4ts under the /var/www/video folder. It seems that this binary dumps the HTTP VERB in the system logs. As a part of doing that it retrieves the HTTP VERB sent by the user and uses a vulnerable sprintf function at address 0x0000C3D4 in the function sub_C210 to copy the value into a string and then into a log file. Since there is no bounds check being performed on the environment variable at address 0x0000C360 this results in a stack overflow and overwrites the PC register allowing an attacker to execute buffer overflow or even a command injection attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dcs-1130 Firmware | ||
Dlink Dcs-1130 | ||
Dlink Dcs-1100 Firmware | ||
Dlink Dcs-1100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8412 is a vulnerability discovered on D-Link DCS-1100 and DCS-1130 devices, which allows an attacker to perform command injection and stack overflow.
The severity of CVE-2017-8412 is high, with a CVSS score of 8.8.
CVE-2017-8412 affects D-Link DCS-1130 devices by exposing them to command injection and stack overflow attacks.
To fix CVE-2017-8412 on D-Link DCS-1130 devices, it is recommended to update the firmware to the latest version provided by D-Link.
More information about CVE-2017-8412 can be found at the following references: [1] [2] [3].