提交 #782299: Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflow信息

标题Tenda AC10 V4 US_AC10V4.0si_V16.03.10.10_multi_TDE01 Stack-based Buffer Overflow
描述Static analysis of /bin/httpd in Tenda AC10 V4 firmware V16.03.10.10 identified 229 call sites to GetValue() which reads NVRAM values into caller-provided buffers without length validation. Multiple goform handlers use fixed-size stack buffers of 16 to 64 bytes as destinations including fromSysToolChangePwd (36 bytes), formSetMacFilterCfg (32 bytes), formGetIPv6status, formWanParameterSetting, formWifiBasicSet, and fromAdvSetLanip. The absence of stack canaries and fixed binary addresses make exploitation of any vulnerable call site reliable.
来源⚠️ https://github.com/somanyerrors/tenda-ac10v4-vulnerabilities/blob/main/findings/HIGH-01-getvalue-229-callers.md
用户
 CoreNode (UID 96566)
提交2026-03-18 16時35分 (1 月前)
管理2026-04-04 15時28分 (17 days later)
状态已接受
VulDB条目355314 [Tenda AC10 16.03.10.10_multi_TDE01 /bin/httpd fromSysToolChangePwd 内存损坏]
积分20

Do you need the next level of professionalism?

Upgrade your account now!