Vulnerability Description
D-Link DIR-822 Rev.Bx devices with firmware v.202KRb06 and older allow a buffer overflow via long MacAddress data in a /HNAP1/SetClientInfo HNAP protocol message, which is mishandled in /usr/sbin/udhcpd during reading of the /var/servd/LAN-1-udhcpd.conf file.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dir-822 Firmware | <= 2.02krb06 |
| Dlink | Dir-822 | - |
Related Weaknesses (CWE)
References
- https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-6258ExploitThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1PatchVendor Advisory
- https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-6258ExploitThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1PatchVendor Advisory
FAQ
What is CVE-2019-6258?
CVE-2019-6258 is a vulnerability with a CVSS score of 9.8 (CRITICAL). D-Link DIR-822 Rev.Bx devices with firmware v.202KRb06 and older allow a buffer overflow via long MacAddress data in a /HNAP1/SetClientInfo HNAP protocol message, which is mishandled in /usr/sbin/udhc...
How severe is CVE-2019-6258?
CVE-2019-6258 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-6258?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dir-822 Firmware, Dlink Dir-822.