Description
WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains a stack-based buffer overflow vulnerability in the firewall.cgi and makeRequest.cgi binaries that allows unauthenticated attackers to overwrite the saved return address by sending a POST request with a Content-Length header exceeding 512 bytes. Attackers can exploit insufficient length validation in the fgets() call to achieve arbitrary code execution through return-oriented programming or return-to-libc techniques.
Problem types
Product status
Any version
Credits
Daniele Berardinelli
Matteo Strada
References
mstreet97.github.io/...aching_the_Machine_Where_to_Look.html
www.made-in-china.com/showroom/yeapook/
www.vulncheck.com/...-based-buffer-overflow-via-firewall-cgi