| Title | Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflow |
|---|
| Description | A stack-based buffer overflow vulnerability exists in the R7WebsSecurityHandler function (0x0043dea0) in /bin/httpd of Tenda AC10 V4 firmware V16.03.10.10. The password parameter of a POST request to /login/Auth is copied via strcpy() into a 128-byte stack buffer without bounds checking. The saved return address is located 1448 bytes from the buffer start. No authentication is required, allowing a remote attacker to overwrite the saved return address and achieve arbitrary code execution. The binary lacks stack canaries, PIE, and ASLR. |
|---|
| Source | ⚠️ https://github.com/somanyerrors/tenda-ac10v4-vulnerabilities/blob/main/findings/CRITICAL-01-preauth-rce-r7websecurityhandler.md |
|---|
| User | CoreNode (UID 96566) |
|---|
| Submission | 03/18/2026 16:19 (23 days ago) |
|---|
| Moderation | 04/04/2026 15:21 (17 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 321809 [Tenda AC10 4.0/16.03.10.09 R7WebsSecurityHandler Password stack-based overflow] |
|---|
| Points | 0 |
|---|