Отправить #754631: Tenda A21 V1.0.0.0 Stack-based Buffer OverflowИнформация

НазваниеTenda A21 V1.0.0.0 Stack-based Buffer Overflow
ОписаниеDuring a security review of the Tenda A21 router firmware (version V1.0.0.0), a critical stack-based buffer overflow vulnerability was identified in the IP-MAC binding configuration endpoint /goform/SetIpMacBind. The vulnerability exists in the fromSetIpMacBind function. This function processes the list parameter which contains the binding rules. The function fails to validate the length of the input string before copying it into a fixed-size stack buffer s[128] using the unsafe strcpy function. Furthermore, the parsed data is passed to set_device_name, which contains additional unsafe sprintf calls, leading to multiple points of stack corruption.
Источник⚠️ https://github.com/QIU-DIE/cve-nneeww/issues/2
Пользователь
 hhsw34 (UID 91076)
Представление09.02.2026 12:39 (3 месяцы назад)
Модерация20.02.2026 15:41 (11 days later)
Статуспринято
Запись VulDB347108 [Tenda A21 1.0.0.0 /goform/SetIpMacBind fromSetIpMacBind list повреждение памяти]
Баллы20

Do you need the next level of professionalism?

Upgrade your account now!