First published: Tue Dec 11 2018(Updated: )
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. There is a stack-based buffer overflow allowing remote attackers to execute arbitrary code without authentication via the goform/formLanguageChange currTime parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-619l Firmware | =2.06b1 | |
Dlink Dir-619l | ||
D-link Dir-605l Firmware | =2.12b1 | |
Dlink Dir-605l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20056 is a vulnerability discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices.
CVE-2018-20056 allows remote attackers to execute arbitrary code without authentication via a stack-based buffer overflow.
CVE-2018-20056 has a severity rating of 9.8 (critical).
Yes, D-Link DIR-619L Rev.B 2.06B1 devices are vulnerable to CVE-2018-20056.
Yes, D-Link DIR-605L Rev.B 2.12B1 devices are vulnerable to CVE-2018-20056.