Submit #782293: Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflowinfo

TitleTenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflow
DescriptionA stack-based buffer overflow vulnerability exists in the R7WebsSecurityHandler function (0x0043dea0) in /bin/httpd of Tenda AC10 V4 firmware V16.03.10.10. The password parameter of a POST request to /login/Auth is copied via strcpy() into a 128-byte stack buffer without bounds checking. The saved return address is located 1448 bytes from the buffer start. No authentication is required, allowing a remote attacker to overwrite the saved return address and achieve arbitrary code execution. The binary lacks stack canaries, PIE, and ASLR.
Source⚠️ https://github.com/somanyerrors/tenda-ac10v4-vulnerabilities/blob/main/findings/CRITICAL-01-preauth-rce-r7websecurityhandler.md
User
 CoreNode (UID 96566)
Submission03/18/2026 16:19 (23 days ago)
Moderation04/04/2026 15:21 (17 days later)
StatusDuplicate
VulDB entry321809 [Tenda AC10 4.0/16.03.10.09 R7WebsSecurityHandler Password stack-based overflow]
Points0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!