Soumettre #785032: Tenda CH22 V1.0.0.1 Stack-based Buffer Overflowinformation

TitreTenda CH22 V1.0.0.1 Stack-based Buffer Overflow
DescriptionA vulnerability was found in Tenda CH22 V1.0.0.1. Affected by this vulnerability is the function formCertLocalPrecreate of the file /goform/CertLocalPrecreate of the component httpd. The manipulation of the argument standard with an unknown input leads to a buffer overflow vulnerability.In formCertLocalPrecreate function,it reads in a user-provided parameter standard,and the variable nptr is passed to the sprintf function without any length check, which may overflow the stack-based buffer s.As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.
La source⚠️ https://github.com/Litengzheng/vuldb_new/blob/main/CH22/vul_52/README.md
Utilisateur
 LtzHuster (UID 95786)
Soumission21/03/2026 11:18 (il y a 24 jours)
Modérer05/04/2026 15:59 (15 days later)
StatutAccepté
Entrée VulDB355396 [Tenda CH22 1.0.0.1 Parameter CertLocalPrecreate formCertLocalPrecreate standard buffer overflow]
Points20

Want to know what is going to be exploited?

We predict KEV entries!