| Titre | Tenda W3 V1.0.0.3(2204) Buffer Overflow |
|---|
| Description | A stack-based buffer overflow exists in Tenda w3 V1.0.0.3(2204). The HTTP handler formSetCfm reads the POST parameter funcpara1 from the /goform/setcfm endpoint and copies it into a fixed-length stack buffer without proper bounds checking. By sending an overlong funcpara1, an unauthenticated attacker on the LAN can overwrite the stack, corrupting the return address and leading to a crash or potential code execution. The issue is triggered in the request parsing path for funcname=save_list_data with a long funcpara1 payload. |
|---|
| La source | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-setcfm-funcpara1-buffer-overflow |
|---|
| Utilisateur | Svigo_o (UID 95970) |
|---|
| Soumission | 27/02/2026 15:05 (il y a 1 mois) |
|---|
| Modérer | 11/03/2026 15:01 (12 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 350407 [Tenda W3 1.0.0.3(2204) HTTP /goform/setcfm formSetCfm funcpara1 buffer overflow] |
|---|
| Points | 20 |
|---|