제출 #725498: Tenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow정보

제목Tenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow
설명The formexeCommand handler in /bin/httpd is vulnerable to stack overflow due to the complete absence of user input sanitization and bounds checking on parameter cmdinput which can lead to corruption of data on the stack, hijacking of control flow, and DoS. The attack can be performed remotely. The vulnerability is in the strcpy() call with no bounds checking. Send a POST request to the /goform/exeCommand endpoint to trigger the buffer overflow
원천⚠️ https://github.com/dwBruijn/CVEs/blob/main/Tenda/execCommand.md
사용자
 dwbruijn (UID 93926)
제출2025. 12. 28. PM 05:52 (3 개월 ago)
모더레이션2025. 12. 29. AM 10:17 (16 hours later)
상태수락
VulDB 항목338643 [Tenda M3 1.0.0.13(4903) /goform/exeCommand cmdinput 메모리 손상]
포인트들20

Do you know our Splunk app?

Download it now for free!