提出 #725498: Tenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow情報

タイトルTenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow
説明The formexeCommand handler in /bin/httpd is vulnerable to stack overflow due to the complete absence of user input sanitization and bounds checking on parameter cmdinput which can lead to corruption of data on the stack, hijacking of control flow, and DoS. The attack can be performed remotely. The vulnerability is in the strcpy() call with no bounds checking. Send a POST request to the /goform/exeCommand endpoint to trigger the buffer overflow
ソース⚠️ https://github.com/dwBruijn/CVEs/blob/main/Tenda/execCommand.md
ユーザー
 dwbruijn (UID 93926)
送信2025年12月28日 17:52 (3 月 ago)
モデレーション2025年12月29日 10:17 (16 hours later)
ステータス承諾済み
VulDBエントリ338643 [Tenda M3 1.0.0.13(4903) /goform/exeCommand cmdinput メモリ破損]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!