Date published: 2017-08-25T14:29:00.230-04:00
Date last modified: 2017-09-08T10:15:19.900-04:00
CVSS Score: 10.0
Principal attack vector: NETWORK
Reference URL: http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html
Summary: D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session’s cookie to username=admin.