First published: Fri Mar 04 2022(Updated: )
D-Link DIR-859 v1.05 was discovered to contain a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-859 Firmware | =1.05 | |
Dlink Dir-859 | ||
Dlink Dir-859 A3 Firmware | =1.05 | |
Dlink Dir-859 A3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-25106.
The severity level of CVE-2022-25106 is high.
CVE-2022-25106 allows attackers to cause a Denial of Service (DoS) via a crafted payload on D-Link DIR-859 v1.05.
No, D-Link DIR-859 A3 firmware version 1.05 is also affected by CVE-2022-25106.
To mitigate CVE-2022-25106, it is recommended to update your D-Link DIR-859 firmware to a fixed version provided by the vendor.