** UNSUPPORTED WHEN ASSIGNED ** D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://www.dlink.com/en/security-bulletin | Vendor Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10216 | Vendor Advisory |
http://seclists.org/fulldisclosure/2021/Apr/15 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/162133/D-Link-DSL-320B-D1-Pre-Authentication-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-04-07 04:15
Updated : 2021-04-20 11:10
NVD link : CVE-2021-26709
Mitre link : CVE-2021-26709
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
d-link
- dsl-320b-d1