Iot-vulhub 自建镜像版
iotvulhub自建镜像使用指南 本项目根据 firmianay/IoT-vulhub 进行加工,原作者删除了 dockerhub 中的镜像,我在本地构建后重新上传 iotvulhub自建镜像使用指南 目前可用镜像 提交镜像方法 准备工作 部分漏洞复现 TP-Link WR841N 栈溢出漏洞(CVE-2020-8423) Tenda AC15 栈溢出漏洞(CVE-2018-16333) 遇到
An issue exists on Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router's web server. While processing the ssid parameter for a POST request, the value is directly used in a sprintf call to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tendacn ac18_firmware |
||
tendacn ac15_firmware 15.03.05.19 |
||
tendacn ac10_firmware 15.03.06.23 |
||
tendacn ac9_firmware 15.03.05.19 |
||
tendacn ac7_firmware 15.03.06.44 |