| Título | Tenda DAP-1520 1.10B04_BETA02 stack-based Buffer Overflow |
|---|
| Descripción | This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. |
|---|
| Fuente | ⚠️ https://github.com/Ghostsuzhijian/Iot-/blob/main/dap1520_check_cookie_buffer_overflow/check_cookie_buffer_overflow.md |
|---|
| Usuario | duojie_0x00 (UID 84463) |
|---|
| Sumisión | 2025-04-24 08:47 (hace 12 meses) |
|---|
| Moderación | 2025-05-05 19:09 (11 days later) |
|---|
| Estado | Duplicado |
|---|
| Entrada de VulDB | 307472 [Tenda DAP-1520 1.10B04_BETA02 /storage check_dws_cookie desbordamiento de búfer] |
|---|
| Puntos | 0 |
|---|