Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
D-Link DIR-632 HTTP POST Request do_file stack-based overflow
Vulnerability Description
A vulnerability was found in D-Link DIR-632 FW103B08. It has been declared as critical. This vulnerability affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
栈缓冲区溢出
Vulnerability Title
D-Link DIR-632 安全漏洞
Vulnerability Description
D-Link DIR-632是中国友讯(D-Link)公司的一款路由器。 D-Link DIR-632 FW103B08版本存在安全漏洞,该漏洞源于HTTP POST Request Handler组件中函数do_file存在栈缓冲区溢出。
CVSS Information
N/A
Vulnerability Type
N/A