Description
A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. This affects the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-262131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32792 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. This affects the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-262131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Mon, 27 Jan 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda w9 Tenda w9 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:w9_firmware:1.0.0.7\(4456\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda w9 Tenda w9 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:33:52.939Z
Reserved: 2024-04-26T12:40:10.668Z
Link: CVE-2024-4240
Updated: 2024-08-01T20:33:52.939Z
Status : Analyzed
Published: 2024-04-26T21:15:50.280
Modified: 2025-01-27T18:30:07.563
Link: CVE-2024-4240
No data.
OpenCVE Enrichment
No data.
EUVD