提交 #759630: Tenda F453 v1.0.0.3 Buffer Access Using Size of Source Buffer信息

标题Tenda F453 v1.0.0.3 Buffer Access Using Size of Source Buffer
描述A vulnerability was found in Tenda F453 v1.0.0.3. It has been declared as critical. Affected by this vulnerability is the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. The manipulation of the argument wanmode and PPPOEPassword with an unknown input leads to a buffer overflow vulnerability.
来源⚠️ https://github.com/Litengzheng/vul_db/blob/main/F453/vul_82/README.md
用户
 LtzHust2 (UID 95662)
提交2026-02-17 16時04分 (2 月前)
管理2026-03-01 07時34分 (12 days later)
状态已接受
VulDB条目348293 [Tenda F453 1.0.0.3 httpd /goform/AdvSetWan fromAdvSetWan wanmode/PPPOEPassword 内存损坏]
积分19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!