First published: Wed Apr 14 2021(Updated: )
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.10b05 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27114 is critical with a CVSS score of 9.8.
CVE-2021-27114 can lead to a Stack-Based Buffer Overflow in D-Link DIR-816 A2 1.10 B05 devices.
CVE-2021-27114 can be exploited by sending a very long text entry for the 's_ip' and 's_mac' fields in the /goform/addassignment route.
The CWE ID for CVE-2021-27114 is CWE-119 and CWE-787.
You can find more information about CVE-2021-27114 at the following references: - [GitHub](https://github.com/GD008/vuln/blob/main/DIR-816_stackoverflow.md) - [D-Link Security Bulletin](https://www.dlink.com/en/security-bulletin/)