Home

Description

Netis ADSL Router DL4322D firmware RTK 2.1.1 contains a buffer overflow vulnerability in the embedded FTP service that allows an authenticated remote user to trigger a denial of service. After logging in to the FTP service, sending an FTP command such as ABOR with an excessively long argument causes the service, and in practice the router, to crash or become unresponsive, resulting in a loss of availability for the device and connected users.

PUBLISHED Reserved 2025-10-29 | Published 2025-11-14 | Updated 2025-11-21 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unknown

Any version
affected

Timeline

2018-09-17:ExploitDB-45424 is publicly disclosed.

Credits

Cakes finder

References

www.exploit-db.com/exploits/45424 exploit

web.archive.org/....netis-systems.com/Home/detail/id/74.html product

www.netis-systems.com/ product

www.vulncheck.com/advisories/netis-dl4322d-ftp-service-dos third-party-advisory

cve.org (CVE-2018-25125)

nvd.nist.gov (CVE-2018-25125)

Download JSON