D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-39787 D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T10:21:33.147Z

Reserved: 2022-08-01T00:00:00

Link: CVE-2022-37134

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-22T15:15:16.870

Modified: 2024-11-21T07:14:30.113

Link: CVE-2022-37134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses