D-Link DIR882-11 Vulnerability Summary Vendor: D-Link Product: DIR882 Version: DIR882A1_FW130B06.bin Vulnerability Type: Stack Overflow Vulnerability Details Affected Function: The function takes a user-controlled input. The input is passed to as the first parameter. uses a for loop to copy the input data, potentially causing stack overflow. How the Vulnerability Occurs 1. , a user-controlled string, is passed into . 2. calls . 3. In , the string is copied into a stack variable , leading to potential overflow. Reproduction Steps 1. Install firmware DIR882A1_FW130B06.bin. 2. Log in to the router as admin. 3. Send the crafted POC data. POC (Proof of Concept) Data Impact Sending the POC can cause a stack overflow, leading to a DOS condition. Potential for remote code execution (RCE).