First published: Thu Dec 20 2018(Updated: )
D-Link DIR-816 A2 1.10 B05 devices allow arbitrary remote code execution without authentication via the newpass parameter. In the /goform/form2userconfig.cgi handler function, a long password may lead to a stack-based buffer overflow and overwrite a return address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-816 A2 Firmware | =1.10b05 | |
Dlink Dir-816 A2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this D-Link DIR-816 A2 firmware vulnerability is CVE-2018-20305.
The severity level of CVE-2018-20305 is critical with a score of 9.8.
This vulnerability allows arbitrary remote code execution without authentication via the newpass parameter in the /goform/form2userconfig.cgi handler function.
An attacker can exploit this vulnerability by sending a long password that triggers a stack-based buffer overflow and overwrites a return address.
Currently, there is no information available regarding a fix for CVE-2018-20305. It is recommended to follow the vendor's security advisories for any updates.