Vendor:http://totolink.net/
Firmware:https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/259/ids/36.html
V2.0.0-B20230727.1043
sub_4594C0
(handle function of formMapDelDevice) of /bin/boa in firmware has multiple buffer overflow vulnerabilities.
Parameter "hostname" is read from HTTP request into $v0_8, then copied to stack variable var_74. When "hostname" has excessive length, this would result an stack buffer overflow.
Parameter "macstr" is read from HTTP request into $v0. Parameter "bandstr" is read from HTTP request into $v0_1.
Stack variable var_120 is constructed using sprintf. When "macstr" or "bandstr" has excessive length, this would result an stack buffer overflow.
Parameter "submit_url" is read from HTTP request and used as 2nd parameter in sub_40bddc at 0x45959c
arg2 is assigned to $s2, stack variable var_120 is constructed using sprintf. When arg2 has excessive length, this would result an stack buffer overflow.
I'm not able to provide full exploit for this vulnerability due to legal reasons.