提交 #792876: Tenda F451_kfw_V1.0.0.7_cn_svn7958 V1.0.0.7 Buffer Overflow信息

标题Tenda F451_kfw_V1.0.0.7_cn_svn7958 V1.0.0.7 Buffer Overflow
描述We found an overflow vulnerability in httpd : In fromqossetting function,it reads in a user-provided parameter qos, And the variable src is passed to the strcpy function without any length check, which may overflow the stack-based buffer dest. As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.
来源⚠️ https://github.com/Jimi-Lab/cve/issues/18
用户
 Jxm666 (UID 96919)
提交2026-03-30 16時03分 (15 日前)
管理2026-04-12 09時22分 (13 days later)
状态已接受
VulDB条目356998 [Tenda F451 1.0.0.7_cn_svn7958 /goform/qossetting fromqossetting qos 内存损坏]
积分19

Want to stay up to date on a daily basis?

Enable the mail alert feature now!