D-Link DIR-632, Stack-Based Buffer Overflow, CVE-2025-5912 (Critical)

Listen to this Post

How CVE-2025-5912 Works

The vulnerability exists in the `do_file` function of the HTTP POST request handler in D-Link DIR-632 firmware version FW103B08. When processing specially crafted HTTP POST requests, the function fails to properly validate input length before copying data to a fixed-size stack buffer. This allows attackers to overwrite adjacent memory regions, including return addresses, enabling remote code execution. The attack requires no authentication and can be performed over the network. Since the device is no longer supported, no official patch is expected from the vendor.

DailyCVE Form

Platform: D-Link DIR-632
Version: FW103B08
Vulnerability: Stack overflow
Severity: Critical
Date: 06/10/2025

Prediction: Unpatched (EOL)

What Undercode Say

curl -X POST -d "A2048" http://target/endpoint
import socket
payload = b"A"1024 + ret_addr
s.send(b"POST / HTTP/1.1\r\nHost: target\r\nContent-Length: " + str(len(payload)) + b"\r\n\r\n" + payload)

How Exploit

Overflow stack via long HTTP POST

Control EIP/RIP register

Execute arbitrary shellcode

Protection from this CVE

Discontinue device use

Network segmentation

Third-party firmware

Impact

Remote code execution

Device compromise

Network infiltration

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top