Submit #654237: Tenda AC23 <= V16.03.07.52 Buffer Overflowinfo

TitleTenda AC23 <= V16.03.07.52 Buffer Overflow
DescriptionA buffer overflow vulnerability was discovered on the latest version of the Tengda AC23 router, V16.03.07.52, where an attacker sent a well-crafted http post packet to the request path /goform/SetPptpServerCfg, triggering a denial of service attack or even RCE, specifically via the function sscanf(s, "%[^.].%[^.].%[^.].%s", v10, v11, v12, &v12[8]) because there is no bounds check on s, causing a stack overflow
Source⚠️ https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC23-3/Tenda%20AC23%20Buffer%20overflow.md
User
 QMSSDXN (UID 88719)
Submission09/15/2025 02:56 (7 months ago)
Moderation09/21/2025 11:40 (6 days later)
StatusAccepted
VulDB entry325161 [Tenda AC23 up to 16.03.07.52 HTTP POST Request /goform/SetPptpServerCfg sscanf startIp buffer overflow]
Points20

Do you need the next level of professionalism?

Upgrade your account now!