Overview

Firmware Name Firmware Version Download Link
DIR-823x 240126 http://www.dlink.com.cn/download.ashx?id=3E012425BDE5E8758B6B29FD8C1C94E3E88F4ABDA14D751500AAD11EDE0BFFA340749746BF23A80A718B6985CBEDC4230BA63126FD5AF277FBD066C78DFEAD0FEA0CD92BFE953F0D&type=0A1CED5533FEE8856B6B79FFCEE286AA
DIR-823x 240802 http://www.dlink.com.cn/download.ashx?id=3E012425BDE5E8758B6B29FD8C1C94E3E88F4ABDA14D751500AAD11EDE0BFFA340749746BF23A80A8CF5B816B08F675F06B9DB5BF0C7D4FE5CD51B9D26D06FEA0A881D5D7BB348E5&type=0A1CED5533FEE8855C02B3E12909E631D69C8200897AC239F0B895473C9CF768

Vulnerability details

1. Vulnerability Trigger Location

The vulnerability trigger location is at the strlenfunction call under the FUN_00412244 function, at address 0x412634. For easier analysis, I referred to the GoAhead 2.5 source code from

https://github.com/ehlalwayoUk/goahead/tree/master

and modified the variable names in Ghidra accordingly.

image.png

2. Conditions to Satisfy

image.png

image.png

image.png

image.png

image.png

image.png

image.png