DCC SEND exploit
Appearance
![]() | It has been suggested that this article be merged into Direct Client-to-Client. (Discuss) Proposed since August 2007. |
The DCC SEND exploit is an IRC related bug in some Netgear and Linksys routers. This bug can be reproduced by typing in an IRC channel:
DCC SEND [character argument]
Replacing [character argument]
with a string of 14 or more characters (not including spaces) will cause users to forcefully disconnect if they are affected. Problematic routers include those manufactured by Netgear, Linksys, and d-link. This is likely directly associated with the firewall feature of these routers; disabling it may resolve the issue.
This exploit is confined to port 6667, so a temporary fix is to connect to your desired IRC server on a different port.