source: wwwsecurityfocuscom/bid/1598/info
Darxite 04 does not do proper bounds checking on user-supplied data during the login process, relying on sprintf() to deliver the data into a 256 character buffer Therefore, it is possible for an attacker to supply arbitrary code for execution at the privilege level of the Darxite user
/*
...