{"uuid": "88c30ef3-c0bb-4423-a84c-57b32ec588d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41140", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/520", "content": "\ud83d\udca5CVE-2022-41140 - D-Link router preauth Stack-based BOF RCE(authentication is not required to exploit this vulnerability).\n(PoC exploit here)\n\nVulnerability exploitation requires to exit the main loop. At the moment no proper way to exit hence we forced it used the following command line.\n$ gdb -batch -ex \"attach `pgrep prog.cgi`\" -ex \"b *0x00429508\" -ex \"continue\" -ex \"j *0x00429538\" -ex \u201ci f\u201d -ex \"p/x $ra\"", "creation_timestamp": "2023-04-26T13:53:52.000000Z"}