Отправить #782299: Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer OverflowИнформация

НазваниеTenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflow
ОписаниеStatic analysis of /bin/httpd in Tenda AC10 V4 firmware V16.03.10.10 identified 229 call sites to GetValue() which reads NVRAM values into caller-provided buffers without length validation. Multiple goform handlers use fixed-size stack buffers of 16 to 64 bytes as destinations including fromSysToolChangePwd (36 bytes), formSetMacFilterCfg (32 bytes), formGetIPv6status, formWanParameterSetting, formWifiBasicSet, and fromAdvSetLanip. The absence of stack canaries and fixed binary addresses make exploitation of any vulnerable call site reliable.
Источник⚠️ https://github.com/somanyerrors/tenda-ac10v4-vulnerabilities/blob/main/findings/HIGH-01-getvalue-229-callers.md
Пользователь
 CoreNode (UID 96566)
Представление18.03.2026 16:35 (1 месяц назад)
Модерация04.04.2026 15:28 (17 days later)
Статуспринято
Запись VulDB355314 [Tenda AC10 16.03.10.10_multi_TDE01 /bin/httpd fromSysToolChangePwd повреждение памяти]
Баллы20

Interested in the pricing of exploits?

See the underground prices here!