提交 #792881: Tenda F451_kfw_V1.0.0.7_cn_svn7958 V1.0.0.7 Buffer Overflow信息

标题Tenda F451_kfw_V1.0.0.7_cn_svn7958 V1.0.0.7 Buffer Overflow
描述We found an overflow vulnerability in httpd : In fromAdvSetWan function,it reads in a user-provided parameter wanmode and PPPOEPassword. If the value of wanmode is 2, the variable v17 is passed to the sub_3C6C0 function without any length check, which may overflow the stack-based buffer s. As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.
来源⚠️ https://github.com/Jimi-Lab/cve/issues/22
用户
 Jxm666 (UID 96919)
提交2026-03-30 16時06分 (18 日前)
管理2026-04-12 09時23分 (13 days later)
状态已接受
VulDB条目357001 [Tenda F451 1.0.0.7_cn_svn7958 /goform/AdvSetWan fromAdvSetWan wanmode/PPPOEPassword 内存损坏]
积分20

Do you know our Splunk app?

Download it now for free!