Page 4 of 17 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'read' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'read <node_name>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code. Se ha descubierto un problema en dispositivos D-Link DSL-3782 EU 1.01. Un usuario autenticado puede pasar un búfer largo como parámetro "read" al binario "/userfs/bin/tcapi" (en el componente Diagnosis) mediante la función "read " y provocar la corrupción de la memoria. • https://github.com/kgsdy/D-Link-DSL-3782-EU • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 1

Diagnostics functionality on D-Link DSL-3782 devices with firmware EU v. 1.01 has a buffer overflow, allowing authenticated remote attackers to execute arbitrary code via a long Addr value to the 'set Diagnostics_Entry' function in an HTTP request, related to /userfs/bin/tcapi. La funcionalidad de diagnóstico en dispositivos D-Link DSL-3782 con firmware EU v. 1.01 tiene un desbordamiento de búfer que permite que atacantes remotos autenticados ejecuten código arbitrario mediante un valor Addr largo en la función "set Diagnostics_Entry" de una petición HTTP. Esto está relacionado con /userfs/bin/tcapi. • https://github.com/SECFORCE/CVE-2018-8941 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •