Description
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copied to the stack variable.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-18640 | An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copied to the stack variable. |
References
| Link | Providers |
|---|---|
| https://github.com/Yu3H0/IoT_CVE/tree/main/Tenda/CVE_1 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:03:33.698Z
Reserved: 2021-04-23T00:00:00.000Z
Link: CVE-2021-31756
No data.
Status : Modified
Published: 2021-05-07T23:15:07.077
Modified: 2024-11-21T06:06:11.083
Link: CVE-2021-31756
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD