{"id":25794,"date":"2019-03-01T18:02:13","date_gmt":"2019-03-01T18:02:13","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/"},"modified":"2019-03-01T18:02:13","modified_gmt":"2019-03-01T18:02:13","slug":"did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/","title":{"rendered":"Did you hear the one about Cisco routers using <code>strcpy<\/code> insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/08\/06\/shutterstock_fail.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Cisco has patched three of its RV-series routers after Pen Test Partners (PTP) found them using hoary old C function <code>strcpy<\/code> insecurely in login authentication function. The programming blunder can be exploited to potentially hijack the devices.<\/p>\n<p>PTP looked at how the routers&#8217; web-based control panel handled login attempts by users, and found that it was alarmingly easy to trigger a buffer overflow by simply supplying a long string of characters as the password, something which Cisco <a target=\"_blank\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190227-rmi-cmd-ex\">admitted<\/a> &#8220;could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device&#8221;.<\/p>\n<p>Lobbing in a password of 447 characters, such as &#8216;A&#8217;, followed by four characters, would allow the hijacker to control a subroutine return address on the web app&#8217;s stack using the values of those final characters. That means the hacker could force the device&#8217;s 32-bit Arm-based processor to jump to malicious code stashed in the login request.<\/p>\n<p>An attacker has to be able to reach the web interface \u2013 either on the local network, or via the remote administration feature that is admittedly disabled by default.<\/p>\n<p>The three routers affected \u2013 the RV110W, RV130W and RV215W \u2013 run &#8220;some form of embedded Linux&#8221; instead of Cisco OS, according to PTP&#8217;s definitely-not-pseudonymous blogger Dave Null. The network equipment provides physical Ethernet ports as well as Wi-Fi connectivity, firewall protections, and VPN tunneling.<\/p>\n<p>The discovery of the flaw was credited to Yu Zhang and Haoliang Lu at the GeekPwn conference, and T. Shiomitsu of Pen Test Partners, who worked and informed Cisco separately.<\/p>\n<h3 class=\"crosshead\"><span>Insecurity a-bounds<\/span><\/h3>\n<p>When following the RV130W&#8217;s login process at the binary executable level, PTP found that the router was placing the user-inputted password string into a memory buffer, ready for authentication against the saved password, using <code>strcpy<\/code> with no bounds checks. That means if the password is larger than the buffer size, it will blow past the end of the buffer and overwrite other data and return addresses on the stack.<\/p>\n<p>As <em>El Reg<\/em> <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2015\/01\/27\/glibc_ghost_vulnerability\/\">reported years ago<\/a> when a similarly worrying use of <code>strcpy<\/code> emerged in glibc: &#8220;<code>strcpy<\/code> is dangerous and an obvious target in an audit because it blindly copies the entire contents of a zero-terminated buffer into another memory buffer without checking the size of the target buffer.&#8221;<\/p>\n<p>Null from PTP <a target=\"_blank\" href=\"https:\/\/www.pentestpartners.com\/security-blog\/cisco-rv130-its-2019-but-yet-strcpy\/\">elaborated<\/a> on Thursday: &#8220;If someone else has control over the source string, you are giving an external entity the capability to overwrite the bounds of the memory that you allocated \u2013 which might mean they can overwrite something important with something bad. In most exploitable cases, this will mean overwriting a saved return pointer on the stack and redirecting the execution flow of the process.&#8221;<\/p>\n<p>He cheerily added: &#8220;Oh yeah, also, no PIE\/ASLR in the binary,&#8221; meaning it&#8217;s pretty easy to exploit. Tutorials on how to leverage buffer overflows on embedded Arm-based gadgets <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/azeria-labs.com\/part-3-stack-overflow-challenges\/\">can be found here<\/a>, for instance.<\/p>\n<p>The security patches for the hardware are free to download, and were released earlier this week; you don&#8217;t need a support contract. Cisco customers should check their routers are running the latest firmware versions, to ensure they are not vulnerable, as follows:<\/p>\n<ul>\n<li>RV110W Wireless-N VPN Firewall: 1.2.2.1<\/li>\n<li>RV130W Wireless-N Multifunction VPN Router: 1.0.3.45<\/li>\n<li>RV215W Wireless-N VPN Router: 1.3.1.1<\/li>\n<\/ul>\n<p>A decade ago Microsoft <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2009\/05\/15\/microsoft_banishes_memcpy\/\">banned the use of a superficially similar function<\/a>, <code>memcopy<\/code>, from its code. PTP&#8217;s Null suggested latterday C authors might want to switch to <code>strlcpy<\/code> instead, &#8220;a nonstandard function which takes a third length argument, and always null terminates&#8221;. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7090\/see-more-attacks-stop-more-attacks?td=wptl1810\">See More Attacks, Stop More Attacks<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/03\/01\/cisco_cve_2019_1663_strcpy_login_authentication\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>RV110W, RV130W, RV215W need patching to close remote hijacking bug Cisco has patched three of its RV-series routers after Pen Test Partners (PTP) found them using hoary old C function strcpy insecurely in login authentication function. The programming blunder can be exploited to potentially hijack the devices.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25795,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-25794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault* 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault* 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-01T18:02:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"348\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*\",\"datePublished\":\"2019-03-01T18:02:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/\"},\"wordCount\":604,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/\",\"name\":\"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault* 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg\",\"datePublished\":\"2019-03-01T18:02:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg\",\"width\":648,\"height\":348},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault* 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/","og_locale":"en_US","og_type":"article","og_title":"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault* 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-01T18:02:13+00:00","og_image":[{"width":648,"height":348,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*","datePublished":"2019-03-01T18:02:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/"},"wordCount":604,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/","url":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/","name":"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault* 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg","datePublished":"2019-03-01T18:02:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault.jpg","width":648,"height":348},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/did-you-hear-the-one-about-cisco-routers-using-strcpy-insecurely-for-login-authentication-makes-you-go-aaaaa-aaaaaaarrg-segfault\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25794"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25794\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25795"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}