Отправить #725498: Tenda M3 V1.0.0.13(4903) Stack-based Buffer OverflowИнформация

НазваниеTenda M3 V1.0.0.13(4903) Stack-based Buffer Overflow
ОписаниеThe formexeCommand handler in /bin/httpd is vulnerable to stack overflow due to the complete absence of user input sanitization and bounds checking on parameter cmdinput which can lead to corruption of data on the stack, hijacking of control flow, and DoS. The attack can be performed remotely. The vulnerability is in the strcpy() call with no bounds checking. Send a POST request to the /goform/exeCommand endpoint to trigger the buffer overflow
Источник⚠️ https://github.com/dwBruijn/CVEs/blob/main/Tenda/execCommand.md
Пользователь
 dwbruijn (UID 93926)
Представление28.12.2025 17:52 (3 месяцы назад)
Модерация29.12.2025 10:17 (16 hours later)
Статуспринято
Запись VulDB338643 [Tenda M3 1.0.0.13(4903) /goform/exeCommand cmdinput повреждение памяти]
Баллы20

Do you need the next level of professionalism?

Upgrade your account now!