提交 #773671: Tenda A18pro V02.03.02.28 Stack-based Buffer Overflow信息

标题Tenda A18pro V02.03.02.28 Stack-based Buffer Overflow
描述During a security review of the Tenda A18pro router firmware (version V02.03.02.28), a critical stack-based buffer overflow vulnerability was identified in the IP-MAC binding configuration endpoint /goform/SetIpMacBind. The vulnerability exists in the fromSetIpMacBind function. This function processes the list parameter which contains the binding rules. The function fails to validate the length of the input string before copying it into a fixed-size stack buffer s[128] using the unsafe strcpy function. Furthermore, the parsed data is passed to set_device_name, which contains additional unsafe sprintf calls, leading to multiple points of stack corruption.
来源⚠️ https://github.com/lilukun337/cve/issues/3
用户
 lilukun (UID 96162)
提交2026-03-06 06時59分 (2 月前)
管理2026-03-20 09時33分 (14 days later)
状态已接受
VulDB条目352017 [Tenda A18 Pro 02.03.02.28 /goform/SetIpMacBind fromSetIpMacBind list 内存损坏]
积分20

Do you know our Splunk app?

Download it now for free!