9.8

CVE-2017-14948

Exploit

Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L 1.08B04 and DIR-895 L/R 1.13b03. The impact is: execute arbitrary code (remote). The component is: htdocs/fileaccess.cgi. The attack vector is: A crafted HTTP request handled by fileacces.cgi could allow an attacker to mount a ROP attack: if the HTTP header field CONTENT_TYPE starts with ''boundary=' followed by more than 256 characters, a buffer overflow would be triggered, potentially causing code execution.

Data is provided by the National Vulnerability Database (NVD)
DlinkDir-868l Firmware Version-
   DlinkDir-868l Version-
DlinkDir-890l Firmware Version-
   DlinkDir-890l Version-
DlinkDir-885l Firmware Version-
   DlinkDir-885l Version-
DlinkDir-895l Firmware Version1.13b03
   DlinkDir-895l Version-
DlinkDir-880l Firmware Version1.08b04
   DlinkDir-880l Version-
DlinkDir-895r Firmware Version1.13b03
   DlinkDir-895r Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.78% 0.884
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.