CVE-2012-10021

A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthenticated attacker can exploit this to execute arbitrary code with root privileges on the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*

History

23 Sep 2025, 17:45

Type Values Removed Values Added
CPE cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*
First Time Dlink dir-605l
Dlink
Dlink dir-605l Firmware
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) Existe una vulnerabilidad de desbordamiento de búfer en la pila en las versiones de firmware 1.12 y 1.13 del D-Link DIR-605L Wireless N300 Cloud Router mediante la función getAuthCode(). La falla se debe al uso inseguro de sprintf() al procesar datos CAPTCHA proporcionados por el usuario mediante el parámetro FILECODE en /goform/formLogin. Un atacante remoto no autenticado puede explotar esto para ejecutar código arbitrario con privilegios de root en el dispositivo.
References () https://forums.dlink.com/index.php?topic=51923.0 - () https://forums.dlink.com/index.php?topic=51923.0 - Issue Tracking
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb - Exploit
References () https://web.archive.org/web/20121012062554/http://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow/ - () https://web.archive.org/web/20121012062554/http://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow/ - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/29127 - () https://www.exploit-db.com/exploits/29127 - Exploit
References () https://www.vulncheck.com/advisories/dlink-dir605l-captcha-handling-stack-based-buffer-overflow - () https://www.vulncheck.com/advisories/dlink-dir605l-captcha-handling-stack-based-buffer-overflow - Third Party Advisory

31 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-31 15:15

Updated : 2025-09-23 17:45


NVD link : CVE-2012-10021

Mitre link : CVE-2012-10021

CVE.ORG link : CVE-2012-10021


JSON object : View

Products Affected

dlink

  • dir-605l
  • dir-605l_firmware
CWE
CWE-121

Stack-based Buffer Overflow