Key Information Vulnerability Overview Vulnerability Type: Stack Buffer Overflow Affected Product: Tenda W12 AP Affected Version: V3.0.0.6(948) Vulnerability Details Description: A stack buffer overflow vulnerability exists in the function of Tenda W12 firmware version V3.0.0.6(948). This function extracts a array from user-controlled JSON input, but does not validate the length of the field. When the JSON payload contains an excessively large value, the call at line 82 overflows the stack buffer. Critical Code Snippet: Proof of Concept (PoC) Debug Information: Provides debugger breakpoints and register states, illustrating the execution flow within the function. Python Script: Includes a Python script to reproduce the vulnerability by sending a maliciously crafted HTTP request to trigger the buffer overflow. How to Reproduce Steps: Use the provided Python script to send a specific JSON payload to the target device, triggering the stack buffer overflow.