漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
D-Link DIR-632 HTTP POST Request get_pure_content stack-based overflow
Vulnerability Description
A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
栈缓冲区溢出
Vulnerability Title
D-Link DIR-632 安全漏洞
Vulnerability Description
D-Link DIR-632是中国友讯(D-Link)公司的一款路由器。 D-Link DIR-632 FW103B08版本存在安全漏洞,该漏洞源于对组件HTTP POST Request Handler中函数get_pure_content的参数Content-Length的错误操作导致栈缓冲区溢出。
CVSS Information
N/A
Vulnerability Type
N/A