A vulnerability, which was classified as critical, was found in Tenda AX1806 1.0.0.1. Affected is the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-262128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32789 | A vulnerability, which was classified as critical, was found in Tenda AX1806 1.0.0.1. Affected is the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-262128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 27 Jan 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ax1806 Tenda ax1806 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda ax1806 Tenda ax1806 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:33:53.021Z
Reserved: 2024-04-26T12:40:01.920Z
Link: CVE-2024-4237
Updated: 2024-08-01T20:33:53.021Z
Status : Analyzed
Published: 2024-04-26T19:15:47.713
Modified: 2025-01-27T18:30:46.217
Link: CVE-2024-4237
No data.
OpenCVE Enrichment
No data.
EUVD