A stack buffer overflow vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin in the rc binary's USB storage handling module. The vulnerability occurs when the "Serial Number" field from a USB device is read via sscanf into a 64-byte stack buffer, while fgets reads up to 127 bytes, causing a stack overflow. An attacker with physical access or control over a USB device can exploit this vulnerability to potentially execute arbitrary code on the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-878
Dlink dir-878 Firmware
Vendors & Products Dlink
Dlink dir-878
Dlink dir-878 Firmware

Thu, 13 Nov 2025 19:00:00 +0000

Type Values Removed Values Added
Description A stack buffer overflow vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin in the rc binary's USB storage handling module. The vulnerability occurs when the "Serial Number" field from a USB device is read via sscanf into a 64-byte stack buffer, while fgets reads up to 127 bytes, causing a stack overflow. An attacker with physical access or control over a USB device can exploit this vulnerability to potentially execute arbitrary code on the device.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-13T18:47:55.196Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60674

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-13T19:15:48.290

Modified: 2025-11-13T19:15:48.290

Link: CVE-2025-60674

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-14T09:27:48Z