Enviar #627394: Tenda AC20 V1.0re_V16.03.08.05 Buffer Overflowinformación

TítuloTenda AC20 V1.0re_V16.03.08.05 Buffer Overflow
DescripciónA stack-based buffer overflow vulnerability exists in Tenda AC20 router via the `/goform/SetFirewallCfg` endpoint. The vulnerability occurs when processing the `firewallEn` parameter: after verifying input length > 3 via `strlen()`, the program uses unsafe `strcpy()` to copy user-controlled data into a fixed-size stack buffer . Due to missing upper-bound length validation, attackers can craft oversized payloads to overflow the buffer. Successful exploitation could allow denial of service, arbitrary code execution.
Fuente⚠️ https://github.com/LaiwanHundun/CVE/blob/main/cve1
Usuario
 hundun (UID 88636)
Sumisión2025-08-02 11:51 (hace 9 meses)
Moderación2025-08-09 09:58 (7 days later)
EstadoAceptado
Entrada de VulDB319339 [Tenda AC20 16.03.08.05 /goform/SetFirewallCfg strcpy firewallEn desbordamiento de búfer]
Puntos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!