First published: Sat May 12 2018(Updated: )
The weblogin_log function in /htdocs/cgibin on D-Link DIR-629-B1 devices allows attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a session.cgi?ACTION=logout request involving a long REMOTE_ADDR environment variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-629-b Firmware | ||
D-Link DIR-629-B |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10996 is classified as high severity due to the potential for arbitrary code execution and denial of service.
To fix CVE-2018-10996, upgrade the firmware of the D-Link DIR-629-B1 device to the latest version that addresses this vulnerability.
CVE-2018-10996 is a buffer overflow vulnerability that allows an attacker to exploit the device's handling of the REMOTE_ADDR environment variable.
CVE-2018-10996 specifically affects D-Link DIR-629-B1 devices running vulnerable firmware versions.
Mitigation options may be limited, but reducing external access or applying network segmentation can potentially lower the risk until a firmware update is applied.