First published: Sun May 13 2018(Updated: )
Stack-based buffer overflow in the websRedirect function in GoAhead on D-Link DIR-816 A2 (CN) routers with firmware version 1.10B05 allows unauthenticated remote attackers to execute arbitrary code via a request with a long HTTP Host header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-816 A2 Firmware | =1.10b05 | |
Dlink Dir-816 A2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11013 is critical with a severity value of 9.8.
CVE-2018-11013 is a stack-based buffer overflow vulnerability in the websRedirect function in GoAhead on D-Link DIR-816 A2 (CN) routers with firmware version 1.10B05, allowing unauthenticated remote attackers to execute arbitrary code via a request with a long HTTP Host header.
CVE-2018-11013 allows unauthenticated remote attackers to execute arbitrary code on the D-Link DIR-816 A2 (CN) router.
To fix CVE-2018-11013, it is recommended to update the firmware of the D-Link DIR-816 A2 (CN) router to a version that includes the necessary security patches.
More information about CVE-2018-11013 can be found at the following link: [link](https://0x3f97.github.io/exploit/2018/05/13/D-Link-DIR-816-A2-CN-router-stack-based-buffer-overflow/)