CVE-2020-29557
Published on January 29, 2021

An issue was discovered on D-Link DIR-825 R1 devices through 3.0.1 before 2020-11-20. A buffer overflow in the web interface allows attackers to achieve pre-authentication remote code execution.

Vendor Advisory NVD

Known Exploited Vulnerability

This D-Link DIR-825 R1 Through 3.0.1 Before 11/2020 Buffer Overflow vulnerability is part of CISA's list of Known Exploited Vulnerabilities. D-Link DIR-825 R1 devices through 3.0.1 before 2020-11-20 contain a vulnerability in the web interface allowing for remote code execution.

The following remediation steps are recommended / required by May 3, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2020-29557 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

What is a Buffer Overflow Vulnerability?

The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVE-2020-29557 has been classified to as a Buffer Overflow vulnerability or weakness.


Products Associated with CVE-2020-29557

You can be notified by stack.watch whenever vulnerabilities like CVE-2020-29557 are published in these products:

What versions are vulnerable to CVE-2020-29557?

Each of the following must match for the vulnerability to exist.