| Title | Tenda A18 V15.13.07.13 Stack-based Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability in the httpd service of Tenda A18 V15.13.07.13 allows remote attackers to cause a Denial of Service (DoS) or execute arbitrary code via the 'wpapsk_crypto5g' parameter in the '/goform/WifiExtraSet' interface. The vulnerability arises from the inadequate length validation of user input before it is copied into a fixed-size stack buffer using the strcpy function in the 'set_repeat5' component. |
|---|
| Source | ⚠️ https://github.com/master-abc/cve/issues/39 |
|---|
| User | 942384053 (UID 94603) |
|---|
| Submission | 02/09/2026 05:33 PM (2 months ago) |
|---|
| Moderation | 02/20/2026 05:13 PM (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 347130 [Tenda A18 15.13.07.13 Httpd Service /goform/WifiExtraSet strcpy wpapsk_crypto5g stack-based overflow] |
|---|
| Points | 20 |
|---|