| Title | Tenda F451_kfw_V1.0.0.7_cn_svn7958 V1.0.0.7 Buffer Overflow |
|---|
| Description | We found an overflow vulnerability in httpd :
In fromSafeMacFilter function,it reads in a user-provided parameter page and menufacturer.
If the value of menufacturer is empty, the variable v6 will be passed to the sprintf function without any length check, which may overflow the stack-based buffer s.
As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution. |
|---|
| Source | ⚠️ https://github.com/Jimi-Lab/cve/issues/16 |
|---|
| User | Jxm666 (UID 96919) |
|---|
| Submission | 03/30/2026 16:02 (13 days ago) |
|---|
| Moderation | 04/11/2026 18:03 (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 356987 [Tenda F451 1.0.0.7 httpd /goform/SafeMacFilter fromSafeMacFilter page/menufacturer stack-based overflow] |
|---|
| Points | 20 |
|---|