제출 #725500: Tenda W6-S V1.0.0.4(510) Stack-based Buffer Overflow정보

제목Tenda W6-S V1.0.0.4(510) Stack-based Buffer Overflow
설명The R7websSsecurityHandler component in /bin/httpd is vulnerable to a pre-authentication stack overflow via the cookie header which allows a remote attacker to hijack execution flow or cause DoS. The vulnerability exists in the R7websSecurityHandler function, specifically the part responsible for parsing the cookie header and that code runs before any authentication or session checks. The vulnerable sscanf call parses everything in the user cookie value until ";" thus overflowing the buffer. To exploit this, all we need to do is send a request with a crafted cookie header to any endpoint.
원천⚠️ https://github.com/dwBruijn/CVEs/blob/main/Tenda/R7WebsSecurityHandler.md
사용자
 dwbruijn (UID 93926)
제출2025. 12. 28. PM 06:04 (3 개월 ago)
모더레이션2025. 12. 29. AM 10:20 (16 hours later)
상태수락
VulDB 항목338645 [Tenda W6-S 1.0.0.4(510) R7websSsecurityHandler /bin/httpd Cookie 메모리 손상]
포인트들20

Do you need the next level of professionalism?

Upgrade your account now!