Vulnerability Description

Vendor: Tenda

Product: AC10

Version: US_AC10V4.0si_V16.03.10.09_multi_TDE01

Type: Buffer Overflow

Firmware link: https://www.tendacn.com/material/show/104560

Vulnerability Details

The function get_parentControl_list_Info copies HTTP parameters deviceID straight into fixed-size fields of the target structure a2 using strcpy() with no length checks. Specifically, deviceId is written to offset +2 (only 32 bytes available) and urls to offset +80 (512 bytes). Supplying strings longer than these buffers over the /goform/getParentControlInfo endpoint lets a remote, unauthenticated attacker overflow the stack/heap, overwrite the saved return address, and execute arbitrary code as root or crash the service. Additional risks come from an unchecked sscanf() on the day parameter and multiple atoi() calls that blindly trust user input, further increasing the chance of memory corruption. In short, the function presents a classic buffer-overflow vulnerability exploitable via the deviceId parameter on all AC10 V4 firmware ≤ 16.03.10.20.

image.png