source: http://www.securityfocus.com/bid/19006/info D-Link wired and wireless routers are prone to a buffer-overflow vulnerability because these devices fail to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Successful exploits can allow remote attackers to execute arbitrary machine code in the context of the affected device. Attackers can exploit this issue by sending a request of the form: M-SEARCH <800 byte string> HTTP/1.0 to UDP port 1900.
Related ExploitsTrying to match CVEs (1): CVE-2006-3687
Trying to match OSVDBs (1): 27333
Other Possible E-DB Search Terms: D-Link Routers
|2018-01-10||D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution||Cr0n1c|
|2010-12-03||D-Link Routers - Authentication Bypass (1)||Craig Heffner|
|2010-01-10||D-Link Routers - Authentication Bypass (2)||SourceSec D...|
|2014-05-26||D-Link Routers - Multiple Vulnerabilities||Kyle Lovett|