// For flags

CVE-2018-11013

 

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in the websRedirect function in GoAhead on D-Link DIR-816 A2 (CN) routers with firmware version 1.10B05 allows unauthenticated remote attackers to execute arbitrary code via a request with a long HTTP Host header.

Desbordamiento de búfer basado en pila en la función websRedirect en GoAhead en los routers D-Link DIR-816 A2 (CN) con la versión del firmware 1.10B05 permite que atacantes remotos no autenticados ejecuten código arbitrario mediante una petición con una cabecera HTTP Host larga.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-05-12 CVE Reserved
  • 2018-05-13 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-08-16 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
D-link
Search vendor "D-link"
Dir-816 A2 Firmware
Search vendor "D-link" for product "Dir-816 A2 Firmware"
1.10b05
Search vendor "D-link" for product "Dir-816 A2 Firmware" and version "1.10b05"
-
Affected
in Dlink
Search vendor "Dlink"
Dir-816 A2
Search vendor "Dlink" for product "Dir-816 A2"
--
Safe