9.8
CVSSv3

CVE-2016-6563

Published: 13/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dir-823_firmware -

dlink dir-822_firmware -

dlink dir-818l\\(w\\)_firmware -

dlink dir-895l_firmware -

dlink dir-890l_firmware -

dlink dir-885l_firmware -

dlink dir-880l_firmware -

dlink dir-868l_firmware -

dlink dir-850l_firmware -

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' # Payload working status: # MIPS: # - all valid payloads working (the ones that we are able to send without null bytes) # ARM: # - inline rev/bind shell works (bind meh sometimes) # - s ...