First published: Mon Feb 25 2019(Updated: )
An issue was discovered on D-Link DIR-878 1.12B01 devices. Because strncpy is misused, there is a stack-based buffer overflow vulnerability that does not require authentication via the HNAP_AUTH HTTP header.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-878 Firmware | =1.12b01 | |
Dlink Dir-878 | ||
All of | ||
D-link Dir-878 Firmware | =1.12b01 | |
Dlink Dir-878 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9125 is a vulnerability discovered on D-Link DIR-878 1.12B01 devices that allows for a stack-based buffer overflow.
CVE-2019-9125 has a severity rating of 9.8 (Critical).
The affected software of CVE-2019-9125 is D-Link DIR-878 1.12B01 firmware.
The CVE-2019-9125 vulnerability can be exploited through a stack-based buffer overflow that does not require authentication via the HNAP_AUTH HTTP header.
Yes, you can find more information about CVE-2019-9125 at the following references: [link1](https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow1.md) and [link2](https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-878/overflow2.md).