Description
A vulnerability has been found in Tenda AC18 15.13.07.09 and classified as critical. Affected by this vulnerability is the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256999. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27495 | A vulnerability has been found in Tenda AC18 15.13.07.09 and classified as critical. Affected by this vulnerability is the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256999. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Tue, 11 Mar 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tenda:ac18_firmware:15.13.07.09:*:*:*:*:*:*:* |
Mon, 27 Jan 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac18 Tenda ac18 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac18_firmware:15.03.07.09:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda ac18 Tenda ac18 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T19:18:47.953Z
Reserved: 2024-03-15T20:04:21.580Z
Link: CVE-2024-2546
Updated: 2024-08-01T19:18:47.953Z
Status : Analyzed
Published: 2024-03-17T02:15:06.190
Modified: 2025-03-11T14:07:31.350
Link: CVE-2024-2546
No data.
OpenCVE Enrichment
No data.
EUVD