Firmware Name | Firmware Version | Download Link |
---|---|---|
DAP-1562 | DAP_1562_REVA_FIRMWARE_1.10 | DAP-1562_FIRMWARE_1.10.ZIP |
The vulnerability is triggered in the connection_set_state
function, where the wrong address pointer is dereferenced.
0x00422548
. It is determined that the vulnerability is caused by an incorrect dereference of the function parameter connection *con
.connection_set_state
function is involved in the connection_state_machine
function. The http_request_parse
function is called before the connection_set_state function
.http_request_parse
function, the variable con
(the register s2/a1
) can still be dereferenced normally.http_request_parse
function, the strncpy
function is called to copy the value corresponding to the Authorization
field in the request onto the stack. However, the buffer size is only 0x12C bytes. If the length of this value exceeds 0x12C, a stack overflow will occur.http_request_parse
function return, it restores the value of the register s2
that was previously saved on the stack. However, due to the stack overflow, this value becomes corrupted.