Description
A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). Affected by this issue is the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be launched remotely. The identifier of this vulnerability is VDB-262136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32797 | A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). Affected by this issue is the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be launched remotely. The identifier of this vulnerability is VDB-262136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Mon, 27 Jan 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda i21 Tenda i21 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:i21_firmware:1.0.0.14\(4656\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda i21 Tenda i21 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:33:53.069Z
Reserved: 2024-04-26T12:40:24.988Z
Link: CVE-2024-4245
Updated: 2024-08-01T20:33:53.069Z
Status : Analyzed
Published: 2024-04-27T08:15:06.277
Modified: 2025-01-27T18:28:31.410
Link: CVE-2024-4245
No data.
OpenCVE Enrichment
No data.
EUVD