| タイトル | Tenda FH451 V1.0.0.9 Stack-based Buffer Overflow |
|---|
| 説明 | The router model FH451V1.0.0.9, manufactured by Shenzhen Tenda Technology Co., Ltd., contains a binary stack-based buffer overflow vulnerability located within the function frmL7ProtForm. This function receives a parameter a1 via a POST request and extracts a variable named page from it. Subsequently, the function utilizes the sprintf function to write the contents of the page variable into a buffer array v11 of size 64 bytes without performing any bounds checking. An attacker can exploit this vulnerability to cause a denial of service (DoS) condition. Furthermore, this vulnerability can be leveraged to construct a Return-Oriented Programming (ROP) chain, enabling the attacker to overwrite the return address and achieve privilege escalation or remote code execution (RCE). |
|---|
| ソース | ⚠️ https://github.com/zezhifu1/cve_report/blob/main/FH451/frmL7ProtForm.md |
|---|
| ユーザー | zezhifu (UID 87457) |
|---|
| 送信 | 2025年07月08日 15:29 (8 月 ago) |
|---|
| モデレーション | 2025年07月11日 22:41 (3 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 316188 [Tenda FH451 1.0.0.9 HTTP POST Request /goform/L7Prot frmL7ProtForm page メモリ破損] |
|---|
| ポイント | 20 |
|---|