ID:4338 - Exploit for Stack-based buffer overflow in libupnp - CVE-2012-5961
Published: August 11, 2020
libupnp
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser when processing a long UDN (aka device) field in a UDP packet. Per CERT's advisory additional products may be affected: http://www.kb.cert.org/vuls/id/922681 "Hundreds of vendors have used the libupnp library in their products, many of which are acting as the home routers for consumer networks. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.