Submeter #754635: Tenda A21 V1.0.0.0 Stack-based Buffer Overflowinformação

TítuloTenda A21 V1.0.0.0 Stack-based Buffer Overflow
DescriçãoDuring a security review of the Tenda A21 router firmware (version V1.0.0.0), a critical buffer overflow vulnerability was identified in the Wi-Fi schedule configuration endpoint /goform/openSchedWifi. The vulnerability exists within the setSchedWifi function. This function retrieves user-controlled parameters schedStartTime and schedEndTime via the websGetVar interface. These values are subsequently copied into a heap-allocated buffer of fixed size (25 bytes) using the unsafe strcpy function. Since there is no length validation on the input, an attacker can provide an oversized string to overflow the buffer, leading to memory corruption, Denial of Service (DoS), or potential arbitrary code execution.
Fonte⚠️ https://github.com/QIU-DIE/cve-nneeww/issues/4
Utilizador
 hhsw34 (UID 91076)
Submissão09/02/2026 12h44 (há 3 meses)
Moderação20/02/2026 15h41 (11 days later)
EstadoAceite
Entrada VulDB347110 [Tenda A21 1.0.0.0 /goform/openSchedWifi setSchedWifi schedStartTime/schedEndTime Excesso de tampão]
Pontos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!