提交 #749703: Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow信息

标题Tenda RX3 V16.03.13.11 Stack-based Buffer Overflow
描述During a security review of the Tenda RX3 router firmware (version V16.03.13.11), a critical stack-based buffer overflow vulnerability was identified in the Wi-Fi configuration endpoint /goform/fast_setting_wifi_set. The vulnerability exists within the form_fast_setting_wifi_set function. This function retrieves the user-controlled parameter ssid via the websGetVar interface and processes it into a fixed-size stack buffer ssid_5g (64 bytes). Due to the use of the unsafe sprintf function without length validation, an attacker can provide an overly long SSID to overwrite the stack, leading to a Denial of Service (DoS) or arbitrary code execution with root privileges.
来源⚠️ https://github.com/LX-66-LX/cve-new/issues/4
用户 LX-66-LX (UID 92717)
提交2026-01-31 10時41分 (3 月前)
管理2026-02-07 16時19分 (7 days later)
状态已接受
VulDB条目344883 [Tenda RX3 16.03.13.11 fast_setting_wifi_set ssid_5g 内存损坏]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!