| Title | Tenda DAP-1520 1.10B04_BETA02 stack-based Buffer Overflow |
|---|
| Description | This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. |
|---|
| Source | ⚠️ https://github.com/Ghostsuzhijian/Iot-/blob/main/dap1520_check_cookie_buffer_overflow/check_cookie_buffer_overflow.md |
|---|
| User | duojie_0x00 (UID 84463) |
|---|
| Submission | 04/24/2025 08:47 (12 months ago) |
|---|
| Moderation | 05/05/2025 19:09 (11 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 307472 [Tenda DAP-1520 1.10B04_BETA02 /storage check_dws_cookie stack-based overflow] |
|---|
| Points | 0 |
|---|