First published: Mon Aug 22 2022(Updated: )
D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-816L Firmware | =1.10cnb04 | |
D-Link DIR-816 Firmware | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-37134.
The severity of CVE-2022-37134 is critical with a CVSS score of 9.8.
The D-link DIR-816 firmware version 1.10cnb04 is affected by CVE-2022-37134.
The vulnerability manifests as a buffer overflow when accessing the /goform/form2Wan.cgi endpoint with wantype set to 3, resulting in a stack overflow.
Yes, D-link has released a security bulletin with information on how to address the vulnerability.