CVE-2016-6563
CRITICAL EXPLOITEDD-Link DIR - Buffer Overflow
Title source: llmDescription
Processing malformed SOAP messages when performing the HNAP Login action causes a buffer overflow in the stack in some D-Link DIR routers. The vulnerable XML fields within the SOAP body are: Action, Username, LoginPassword, and Captcha. The following products are affected: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L, DIR-868L, and DIR-850L.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/40805
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/dlink_hnap_login_bof.rb
References (4)
Scores
CVSS v3
9.8
EPSS
0.8489
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-02-27
CWE
CWE-119
CWE-121
Status
published
Products (9)
dlink/dir-818l\(w\)_firmware
dlink/dir-822_firmware
dlink/dir-823_firmware
dlink/dir-850l_firmware
dlink/dir-868l_firmware
dlink/dir-880l_firmware
dlink/dir-885l_firmware
dlink/dir-890l_firmware
dlink/dir-895l_firmware
Published
Jul 13, 2018
Tracked Since
Feb 18, 2026