### [CVE-2016-6563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6563) ![](https://img.shields.io/static/v1?label=Product&message=DIR-818L(W)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-822&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-823&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-850L&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-868L&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-880L&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-885L&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-890L&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-895L&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121&color=brighgreen) ### Description Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L. ### POC #### Reference - http://seclists.org/fulldisclosure/2016/Nov/38 - https://www.exploit-db.com/exploits/40805/ - https://www.kb.cert.org/vuls/id/677427 #### Github - https://github.com/ARPSyndicate/cvemon