DCC SEND exploit
This redirect may meet Wikipedia's criteria for speedy deletion because: This is ridiculous, and placed here simply to troll people.. For valid criteria, see CSD.
If this redirect does not meet the criteria for speedy deletion, or you intend to fix it, please remove this notice, but do not remove this notice from pages that you have created yourself. If you created this page and you disagree with the given reason for deletion, you can click the button below and leave a message explaining why you believe it should not be deleted. You can also visit the talk page to check if you have received a response to your message. Note that this redirect may be deleted at any time if it unquestionably meets the speedy deletion criteria, or if an explanation posted to the talk page is found to be insufficient.
Note to administrators: this redirect has content on its talk page which should be checked before deletion. Administrators: check links, talk, history (last), and logs before deletion. Consider checking Google.This page was last edited by 24.13.141.176 (contribs | logs) at 18:40, 21 November 2007 (UTC) (17 years ago) |
The DCC SEND exploit is an IRC related bug in some Netgear, Linksys, and d-link routers. This bug can be reproduced by typing in an IRC channel:
DCC SEND [character argument]
Replacing [character argument]
with a string of 14 or more characters (not including spaces) will cause users to forcefully disconnect if they are affected.
This is likely directly associated with the smart firewalling feature of these routers; disabling it may resolve the issue.
This exploit is confined to port 6667, so a temporary fix is to connect to your desired IRC server on a different port.