Description
A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by this vulnerability is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32796 | A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by this vulnerability is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Mon, 27 Jan 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda w9 Tenda w9 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:w9_firmware:1.0.0.7\(4456\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda w9 Tenda w9 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:33:53.169Z
Reserved: 2024-04-26T12:40:22.188Z
Link: CVE-2024-4244
Updated: 2024-08-01T20:33:53.169Z
Status : Analyzed
Published: 2024-04-26T22:15:08.867
Modified: 2025-01-27T18:28:39.927
Link: CVE-2024-4244
No data.
OpenCVE Enrichment
No data.
EUVD