Description
A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32631 | A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Tue, 21 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac8 Tenda ac8 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac8_firmware:16.03.34.09:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda ac8 Tenda ac8 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:26:57.266Z
Reserved: 2024-04-23T13:22:24.724Z
Link: CVE-2024-4066
Updated: 2024-08-01T20:26:57.266Z
Status : Analyzed
Published: 2024-04-23T21:15:49.040
Modified: 2025-01-21T18:55:06.723
Link: CVE-2024-4066
No data.
OpenCVE Enrichment
No data.
EUVD