# N/A
## 概述
Tenda AX-1806 v1.0.0.1设备中发现存在栈溢出漏洞,位于`sub_4C408`函数的security参数处理过程中。
## 影响版本
Tenda AX-1806 v1.0.0.1
## 细节
漏洞存在于`sub_4C408`函数对security参数的处理逻辑中,由于未对输入数据进行有效边界检查,导致栈溢出。
## 影响
攻击者可通过构造恶意请求触发栈溢出,导致设备拒绝服务(DoS)。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: VulnbyCola/Tenda/AX-1806/5/1.md at main · 0-fool/VulnbyCola · GitHub -- 🔗来源链接
标签:
神龙速读:
### 关键信息
- **Vendor**: Tenda
- **Product**: AX-1806
- **Version**: v1.0.0.1 (Link: [https://www.tenda.com.cn/download/detail-3421.html](https://www.tenda.com.cn/download/detail-3421.html))
- **Vulnerability Type**: Stack Overflow
- **Author**: Chuanhao Wan
- **Institution**: Huazhong University of Science and Technology (HUST)
- **Vulnerability Cause**
- In `sub_4C408`, user-controlled input for `v11` is copied into a fixed 256-byte buffer `s` through `strcpy`. The "security" parameter, directly provided by the user without length restriction, can cause a buffer overflow.
- The overflow corrupts adjacent stack memory, overwrites local variables/control data, and ultimately leads to a crash and Denial of Service.
- **PoC Attack**
- The exploit Python script sends a large string "A" * 7000 as the "security" parameter and causes the device to enter inaccessible status.
- **Result**
- The router crashes and stops offering services.
暂无评论