DCC SEND exploit
Appearance
![]() | It has been suggested that this article be merged into Direct Client-to-Client. (Discuss) Proposed since August 2007. |
The DCC SEND exploit is an IRC related bug in some Netgear, Linksys, and d-link routers. This bug can be reproduced by typing in an IRC channel:
DCC SEND [character argument]
Replacing [character argument]
with a string of 14 or more characters (not including spaces) will cause users to forcefully disconnect if they are affected.
This is likely directly associated with the smart firewalling feature of these routers; disabling it may resolve the issue.
This exploit is confined to port 6667, so a temporary fix is to connect to your desired IRC server on a different port.