First published: Tue Jul 02 2019(Updated: )
An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The binary orthrus in /sbin folder of the device handles all the UPnP connections received by the device. It seems that the binary performs a sprintf operation at address 0x0000A3E4 with the value in the command line parameter "-f" and stores it on the stack. Since there is no length check, this results in corrupting the registers for the function sub_A098 which results in memory corruption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dcs-1100 Firmware | ||
Dlink Dcs-1100 | ||
Dlink Dcs-1130 Firmware | ||
Dlink Dcs-1130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8414 is an issue discovered on D-Link DCS-1100 and DCS-1130 devices, where the binary orthrus in the /sbin folder of the device handles all the UPnP connections received, and has a command injection and stack overflow vulnerability.
CVE-2017-8414 affects D-Link DCS-1100 devices running vulnerable firmware versions, allowing attackers to exploit the command injection and stack overflow vulnerability.
CVE-2017-8414 affects D-Link DCS-1130 devices running vulnerable firmware versions, allowing attackers to exploit the command injection and stack overflow vulnerability.
CVE-2017-8414 has a severity rating of 7.8 (high).
To fix CVE-2017-8414, D-Link DCS-1100 and DCS-1130 device users should update to the latest firmware version provided by D-Link.