CVE-2012-10021

CRITICAL

D-Link DIR-605L Wireless N300 Cloud Router <1.13 - Buffer Overflow

Title source: llm

Description

A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthenticated attacker can exploit this to execute arbitrary code with root privileges on the device.

Exploits (2)

exploitdb WORKING POC
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/29127
metasploit WORKING POC MANUAL
by Craig Heffner, juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb

Scores

CVSS v3 9.8
EPSS 0.5924
EPSS Percentile 98.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-121
Status published
Products (2)
D-Link/DIR-605L 1.12 - 1.13
dlink/dir-605l_firmware 1.12 - 1.13
Published Jul 31, 2025
Tracked Since Feb 18, 2026