First published: Thu May 03 2018(Updated: )
An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'read' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'read <node_name>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dsl-3782 Firmware | =1.01 | |
Dlink Dsl-3782 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability of CVE-2018-10713 allows an authenticated user to cause memory corruption by passing a long buffer as a parameter.
An authenticated user can exploit CVE-2018-10713 by passing a long buffer as a 'read' parameter to the '/userfs/bin/tcapi' binary.
The severity of CVE-2018-10713 is rated as high with a CVSS score of 8.8.
To fix CVE-2018-10713, it is recommended to update the firmware of the D-Link DSL-3782 device to the latest version provided by the manufacturer.
No, the Dlink DSL-3782 device is not vulnerable to CVE-2018-10713.