Vulnerability Details CVE-2016-5681
Stack-based buffer overflow in dws/api/Login on D-Link DIR-850L B1 2.07 before 2.07WWB05, DIR-817 Ax, DIR-818LW Bx before 2.05b03beta03, DIR-822 C1 3.01 before 3.01WWb02, DIR-823 A1 1.00 before 1.00WWb05, DIR-895L A1 1.11 before 1.11WWb04, DIR-890L A1 1.09 before 1.09b14, DIR-885L A1 1.11 before 1.11WWb07, DIR-880L A1 1.07 before 1.07WWb08, DIR-868L B1 2.03 before 2.03WWb01, and DIR-868L C1 3.00 before 3.00WWb01 devices allows remote attackers to execute arbitrary code via a long session cookie.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.254
EPSS Ranking 95.9%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 9.3
Products affected by CVE-2016-5681
-
cpe:2.3:h:dlink:dir-817l(w):ax
-
cpe:2.3:h:dlink:dir-818l(w):ax
-
cpe:2.3:h:dlink:dir-822:a1
-
cpe:2.3:h:dlink:dir-823:a1
-
cpe:2.3:h:dlink:dir-850l:b1
-
cpe:2.3:h:dlink:dir-868l:b1
-
cpe:2.3:h:dlink:dir-868l:c1
-
cpe:2.3:h:dlink:dir-880l:a1
-
cpe:2.3:h:dlink:dir-885l:a1
-
cpe:2.3:h:dlink:dir-890l:a1
-
cpe:2.3:h:dlink:dir-895l:a1
-
cpe:2.3:o:d-link:dir-817l(w)_firmware:*
-
cpe:2.3:o:d-link:dir-818l(w)_firmware:*
-
cpe:2.3:o:d-link:dir-823_firmware:*
-
cpe:2.3:o:d-link:dir-850l_firmare:*
-
cpe:2.3:o:d-link:dir-880l_firmware:*
-
cpe:2.3:o:d-link:dir-885l_firmware:*
-
cpe:2.3:o:d-link:dir-890l_firmware:*
-
cpe:2.3:o:d-link:dir-895l_firmware:*
-
cpe:2.3:o:dlink:dir-822_firmware:3.01
-
cpe:2.3:o:dlink:dir-868l_firmware:-
-
cpe:2.3:o:dlink:dir-868l_firmware:1.10
-
cpe:2.3:o:dlink:dir-868l_firmware:1.12
-
cpe:2.3:o:dlink:dir-868l_firmware:1.12_eu_multi_20170316
-
cpe:2.3:o:dlink:dir-868l_firmware:1.12b04
-
cpe:2.3:o:dlink:dir-868l_firmware:2.00
-
cpe:2.3:o:dlink:dir-868l_firmware:2.01
-
cpe:2.3:o:dlink:dir-868l_firmware:2.03
-
cpe:2.3:o:dlink:dir-868l_firmware:2.05b02
-
cpe:2.3:o:dlink:dir-868l_firmware:3.00