DCC SEND exploit
Appearance
![]() | It has been suggested that this article be merged into Direct Client-to-client. (Discuss) Proposed since August 2007. |
The DCC SEND exploit is an IRC related bug in some Netgear and Linksys routers. This bug can be reproduced by typing in an IRC channel:
DCC SEND [character argument]
Replacing [character argument]
with a string of 14 or more characters (not including spaces) will cause some users to accidentally disconnect. On some large networks, more than 40 connections can be broken this way. Only if the users of the channel are using the affected Netgear/Linksys routers will they have their connection broken.
Usually, this exploit can be avoided by connecting to the IRC server using a port other than 6667, which is what most clients default to.
Disclaimer: Sometimes, reproducing this bug can result in getting yourself K-lined.