cve/2016/CVE-2016-6563.md
2024-06-18 02:51:15 +02:00

28 lines
1.5 KiB
Markdown

### [CVE-2016-6563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6563)
![](https://img.shields.io/static/v1?label=Product&message=DIR-818L(W)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-822&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-823&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-850L&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-868L&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-880L&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-885L&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-890L&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-895L&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121&color=brighgreen)
### Description
Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2016/Nov/38
- https://www.exploit-db.com/exploits/40805/
- https://www.kb.cert.org/vuls/id/677427
#### Github
- https://github.com/ARPSyndicate/cvemon