ID:5641 - Exploit for Stack-based buffer overflow in libupnp - CVE-2012-5958
Published: June 17, 2021
libupnp
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser when processing a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction. Per CERT's advisory additional products may be affected: http://www.kb.cert.org/vuls/id/922681 "Hundreds of vendors have used the libupnp library in their products, many of which are acting as the home routers for consumer networks. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.