First published: Fri May 04 2018(Updated: )
An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'show' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'show <node_name>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dsl-3782 Firmware | =1.01 | |
Dlink Dsl-3782 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-10748 is critical with a score of 8.8.
CVE-2018-10748 affects D-Link DSL-3782 EU 1.01 devices by allowing an authenticated user to pass a long buffer and cause memory corruption.
An authenticated user can exploit CVE-2018-10748 by using the 'show <node_name>' function with a long buffer as the 'show' parameter in the '/userfs/bin/tcapi' binary.
The vulnerability reference for CVE-2018-10748 is available at https://github.com/kgsdy/D-Link-DSL-3782-EU/blob/master/show.md.
The Common Weakness Enumeration (CWE) ID for CVE-2018-10748 is 119.