First published: Fri May 04 2018(Updated: )
An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'get' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'get <node_name attr>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dsl-3782 Firmware | =1.01 | |
Dlink Dsl-3782 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10746 is a vulnerability discovered on D-Link DSL-3782 EU 1.01 devices that allows an authenticated user to pass a long buffer and cause memory corruption.
CVE-2018-10746 affects D-Link DSL-3782 EU 1.01 devices by allowing an authenticated user to pass a long buffer, causing memory corruption.
CVE-2018-10746 has a severity rating of 8.8 (critical).
An authenticated user can exploit CVE-2018-10746 by passing a long buffer as a 'get' parameter to the '/userfs/bin/tcapi' binary using the 'get <node_name attr>' function.
Currently, there is no known fix for CVE-2018-10746. It is recommended to contact the vendor for further information.