漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
D-Link DIR-513 HTTP POST Request formSetWanL2TPtriggers formSetWanL2TPcallback stack-based overflow
Vulnerability Description
A vulnerability was found in D-Link DIR-513 up to 1.10 and classified as critical. This issue affects the function formSetWanL2TPcallback of the file /goform/formSetWanL2TPtriggers of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
栈缓冲区溢出
Vulnerability Title
D-Link DIR-513 安全漏洞
Vulnerability Description
D-Link DIR-513是中国友讯(D-Link)公司的一款无线路由器产品。 D-Link DIR-513 1.10及之前版本存在安全漏洞,该漏洞源于文件/goform/formSetWanL2TPtriggers中函数formSetWanL2TPcallback导致栈缓冲区溢出。
CVSS Information
N/A
Vulnerability Type
N/A