提出 #725500: Tenda W6-S V1.0.0.4(510) Stack-based Buffer Overflow情報

タイトルTenda W6-S V1.0.0.4(510) Stack-based Buffer Overflow
説明The R7websSsecurityHandler component in /bin/httpd is vulnerable to a pre-authentication stack overflow via the cookie header which allows a remote attacker to hijack execution flow or cause DoS. The vulnerability exists in the R7websSecurityHandler function, specifically the part responsible for parsing the cookie header and that code runs before any authentication or session checks. The vulnerable sscanf call parses everything in the user cookie value until ";" thus overflowing the buffer. To exploit this, all we need to do is send a request with a crafted cookie header to any endpoint.
ソース⚠️ https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md
ユーザー
 dwbruijn (UID 93926)
送信2025年12月28日 18:04 (3 月 ago)
モデレーション2025年12月29日 10:20 (16 hours later)
ステータス承諾済み
VulDBエントリ338645 [Tenda W6-S 1.0.0.4(510) R7websSsecurityHandler /bin/httpd Cookie メモリ破損]
ポイント20

Might our Artificial Intelligence support you?

Check our Alexa App!