| Title | Tenda AC20 ≤ V16.03.08.12 (latest version) Buffer Overflow |
|---|
| Description | A buffer overflow vulnerability was discovered on the latest version of the Tengda AC20 router, V16.03.08.12, where an attacker sent a well-constructed http post packet to the request path /goform/saveParentControlInfo, triggering a denial of service attack or even RCE, specifically via the function strcpy(s + 2, var); triggered, the reason is because there is no boundary check on var |
|---|
| Source | ⚠️ https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md |
|---|
| User | QMSSDXN (UID 88719) |
|---|
| Submission | 08/11/2025 11:31 (8 months ago) |
|---|
| Moderation | 08/13/2025 14:01 (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 319903 [Tenda AC20 up to 16.03.08.12 saveParentControlInfo strcpy Time buffer overflow] |
|---|
| Points | 20 |
|---|