| Título | Tenda AC20 V1.0re_V16.03.08.05 Buffer Overflow |
|---|
| Descrição | A stack-based buffer overflow vulnerability exists in Tenda AC20 router via the `/goform/SetFirewallCfg` endpoint. The vulnerability occurs when processing the `firewallEn` parameter: after verifying input length > 3 via `strlen()`, the program uses unsafe `strcpy()` to copy user-controlled data into a fixed-size stack buffer . Due to missing upper-bound length validation, attackers can craft oversized payloads to overflow the buffer. Successful exploitation could allow denial of service, arbitrary code execution.
|
|---|
| Fonte | ⚠️ https://github.com/LaiwanHundun/CVE/blob/main/cve1 |
|---|
| Utilizador | hundun (UID 88636) |
|---|
| Submissão | 02/08/2025 11h51 (há 9 meses) |
|---|
| Moderação | 09/08/2025 09h58 (7 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 319339 [Tenda AC20 16.03.08.05 /goform/SetFirewallCfg strcpy firewallEn Excesso de tampão] |
|---|
| Pontos | 20 |
|---|