提交 #782295: Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflow信息

标题Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflow
描述Multiple stack-based buffer overflow vulnerabilities exist in the R7WebsSecurityHandler function (0x0043dea0) in /bin/httpd of Tenda AC10 V4 firmware V16.03.10.10. User-controlled input from websGetVar() flows into strcpy() at 0x0043f6d0 and 0x0043fba4, and into sprintf() at 0x0043f768 and 0x004404a4, without bounds checking. As a pre-authentication handler, all paths are reachable without credentials, allowing a remote attacker to corrupt the stack and achieve arbitrary code execution.
来源⚠️ https://github.com/somanyerrors/tenda-ac10v4-vulnerabilities/blob/main/findings/CRITICAL-02-buffer-overflows-r7websecurityhandler.md
用户
 CoreNode (UID 96566)
提交2026-03-18 16時22分 (1 月前)
管理2026-04-04 15時21分 (17 days later)
状态重复
VulDB条目321809 [Tenda AC10 4.0/16.03.10.09 R7WebsSecurityHandler 密码 内存损坏]
积分0

Do you know our Splunk app?

Download it now for free!