Description
Tenda FH1206 v02.03.01.35 was discovered to contain a stack-based buffer overflow vulnerability in the fromPptpUserAdd function. The vulnerability can be triggered via the modino, username, newpwd, or pptpdnetseg parameters, all of which are passed via HTTP POST and used in unsafe sprintf calls without proper length validation. A remote attacker can exploit this flaw through a crafted POST request, which may cause a Denial of Service (DoS). In certain scenarios, this issue could potentially be leveraged to achieve remote code execution.
References (4)
Core 4
Core References
Exploit, Third Party Advisory
https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromPptpUserAdd.md
Various Sources
https://github.com/laohouzju/PoC/blob/main/Tenda%20FH1206%20fromPptpUserAdd_newpwd.md
Scores
CVSS v3
7.5
EPSS
0.0842
EPSS Percentile
92.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-787
Status
published
Products (1)
tenda/fh1206_firmware
v02.03.1.35
Published
Aug 15, 2024
Tracked Since
Feb 18, 2026