diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index e7952557bea..7f10e0d01ee 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -174,3 +174,6 @@ a54acc2967c672e5e38caeda252841f3 1e08c25047fa9f92b66aee2e4958217b 9bcdce8067fbda8dfe25caea500fb8d2 c46a26d684fb5e2757ff7808512144bf +9db583c37156a3fdbfb4df45612408b0 +67733a9f8c1f6254caf89c10153ab4af +8c859af799731748976056b3a847eb82 diff --git a/data/cves.db b/data/cves.db index 2a48e3d246b..e23557af0f7 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index 55618d75ed4..ba193f30e2b 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-05-02 00:15:07 D-Link DIR-X3260 prog.cgi SetUsersSettings Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-size stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21675. 详情