| Título | Tenda i3 V1.0.0.6(2204) Buffer Overflow |
|---|
| Descripción | Affected component(s): httpd, formexeCommand, /goform/exeCommand, cmdinput
Attack vector(s): Remote exploitation via crafted HTTP POST to /goform/exeCommand with an overly long cmdinput.
Suggested description: Tenda i3 V1.0.0.6(2204) contains a stack-based buffer overflow in httpd due to insufficient length validation of the cmdinput parameter in formexeCommand. A remote attacker can send a crafted request to /goform/exeCommand to trigger a denial of service or potentially achieve code execution.
Discoverer(s)/Credits: Svigo, Huazhong University of Science and Technology |
|---|
| Fuente | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-formexeCommand-cmdinput-buffer-overflow |
|---|
| Usuario | Svigo (UID 95964) |
|---|
| Sumisión | 2026-02-27 09:18 (hace 1 mes) |
|---|
| Moderación | 2026-03-08 13:39 (9 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 349769 [Tenda i3 1.0.0.6(2204) /goform/exeCommand formexeCommand cmdinput desbordamiento de búfer] |
|---|
| Puntos | 20 |
|---|