| शीर्षक | Tenda i12 V1.0.0.6(2204) Buffer Overflow |
|---|
| विवरण | We found an overflow vulnerability in httpd :
In formexeCommand function,it reads in a user-provided parameter cmdinput,
and the variable Var is passed to the vos_strcpy function without any length check, which may overflow the stack-based buffers.
As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.
|
|---|
| स्रोत | ⚠️ https://github.com/Jimi-Lab/cve/issues/1 |
|---|
| उपयोगकर्ता | Jimi (UID 68862) |
|---|
| सबमिशन | 28/02/2026 02:35 AM (2 महीनों पहले) |
|---|
| संयम | 12/03/2026 09:30 AM (12 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 350653 [Tenda i12 1.0.0.6(2204) /goform/exeCommand vos_strcpy cmdinput बफ़र ओवरफ़्लो] |
|---|
| अंक | 20 |
|---|