Description
A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
1.0.07
Credits
Craig Heffner
References
raw.githubusercontent.com/...ys_tmunblock_admin_reset_bof.rb
www.exploit-db.com/exploits/31758
web.archive.org/...m/2014/02/wrt120n-fprintf-stack-overflow/
www.vulncheck.com/...ed-buffer-overflow-admin-password-reset
nvd.nist.gov (CVE-2014-125122)