Impact
A stack-based buffer overflow exists in the redirect_count_down_page function of the SOAP Handler on the D-Link DHP-1320 router. Sending a specially crafted SOAP request can trigger the overflow, potentially allowing the attacker to execute arbitrary code or cause a denial‑of‑service. The flaw is a classic buffer overflow (CWE‑119/121) that compromises the device’s confidentiality and integrity.
Affected Systems
This exploit targets the D-Link DHP-1320 running firmware version 1.00WWB04 or earlier, a product no longer supported by the manufacturer. No other D-Link devices are affected by this specific vulnerability.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity risk, meaning the flaw could give attackers substantial control over the device. Although EPSS data is not available, the publicly available exploit shows that remote attackers can send crafted SOAP requests to trigger the overflow. The vulnerability is not listed in the CISA KEV catalog, but its combination of high severity and remote exploitability makes it a priority for remediation.
OpenCVE Enrichment