CVE-2016-6563

CVSS V2 High 10 CVSS V3 Critical 9.8
Description
Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.
Overview
  • CVE ID
  • CVE-2016-6563
  • Assigner
  • cret@cert.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2018-07-13T20:29:01
  • Last Modified Date
  • 2019-10-09T23:19:16
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:dlink:dir-823_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-823:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-822_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-818l\(w\)_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-818l\(w\):-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-895l_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-895l:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-890l_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-890l:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-885l_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-885l:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-880l_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-880l:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-868l_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:dlink:dir-850l_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.kb.cert.org/vuls/id/677427 Third Party Advisory US Government Resource
http://seclists.org/fulldisclosure/2016/Nov/38 Exploit Mailing List Third Party Advisory
https://www.exploit-db.com/exploits/40805/ Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/94130 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 17:14:05 Added to TrackCVE
2022-12-03 09:52:07 cert@cert.org cret@cert.org CVE Assigner updated
2022-12-03 09:52:07 2018-07-13T20:29Z 2018-07-13T20:29:01 CVE Published Date updated
2022-12-03 09:52:07 2019-10-09T23:19:16 CVE Modified Date updated
2022-12-03 09:52:07 Modified Vulnerability Status updated