web_tacplus_serverEdit_post_tacIp
web_tacplus_serverEdit_post_tacIp
During my internship at Qi An Xin Tiangong Lab, I discovered a stack overflow vulnerability in the Planet router.
By analyzing the dispatcher file in the bin directory, I found that the function web_tacplus_serverEdit_post contains a stack overflow vulnerability.
The stack overflow can be triggered by tacIp value, which leads to a memcpy stack overflow.
In the main function, there is an account authentication detection. We create a cookie_0 in the tmp directory, with the content of “20 0 0”, and its function is to create a cookie with sufficient permissions to access this route.
1 |
|
The content of the poc.py file is as follows:
1 |
|
Attack result
通过上述截图可以看到我们已经溢出到了0x1e8,并且劫持了程序控制流,如果需要的话可以溢出更多
web_tacplus_serverEdit_post_tacIp
https://lafdrew.github.io/2025/04/20/web-tacplus-serverEdit-post-tacIp/