提出 #749718: Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow情報

タイトルTenda RX3 V16.03.13.11 Stack-based Buffer Overflow
説明During a security review of the Tenda RX3 router firmware (version V16.03.13.11), a critical stack-based buffer overflow vulnerability was identified in the IP-MAC binding configuration endpoint /goform/SetIpMacBind. The vulnerability exists in the fromSetIpMacBind function. This function processes the list parameter which contains the binding rules. The function fails to validate the length of the input string before copying it into a fixed-size stack buffer s[128] using the unsafe strcpy function. Furthermore, the parsed data is passed to set_device_name, which contains additional unsafe sprintf calls, leading to multiple points of stack corruption.
ソース⚠️ https://github.com/LX-66-LX/cve-new/issues/7
ユーザー LX-66-LX (UID 92717)
送信2026年01月31日 11:53 (3 月 ago)
モデレーション2026年02月07日 18:16 (7 days later)
ステータス承諾済み
VulDBエントリ344889 [Tenda RX3 16.03.13.11 /goform/SetIpMacBind fromSetIpMacBind list メモリ破損]
ポイント20

Do you know our Splunk app?

Download it now for free!