| タイトル | Tenda W3 V1.0.0.4(3822)_EN Buffer Overflow |
|---|
| 説明 | A stack-based buffer overflow vulnerability exists in Tenda w3 V1.0.0.4(3822)_EN in the HTTP handler formSetCfm, exposed through the /goform/setcfm endpoint. The POST parameter funcpara1 is copied into a fixed-size stack buffer without bounds checking. An attacker can send a crafted request with an oversized funcpara1 value to corrupt stack memory, crashing the web management service and potentially enabling control‑flow hijacking. The issue is reachable from the router’s HTTP interface with a single POST request and does not require prior authentication in default configurations. |
|---|
| ソース | ⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-w3-v1.0.0.4(3822)_EN-setcfm-funcpara1-buffer-overflow |
|---|
| ユーザー | Svigo (UID 95964) |
|---|
| 送信 | 2026年03月12日 04:09 (17 日 ago) |
|---|
| モデレーション | 2026年03月27日 15:19 (15 days later) |
|---|
| ステータス | 重複 |
|---|
| VulDBエントリ | 350407 [Tenda W3 1.0.0.3(2204) HTTP /goform/setcfm formSetCfm funcpara1 メモリ破損] |
|---|
| ポイント | 0 |
|---|