Description
A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). Affected is the function formSetAutoPing. The manipulation of the argument ping1/ping2 leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263082 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-44107 | A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). Affected is the function formSetAutoPing. The manipulation of the argument ping1/ping2 leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263082 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Mon, 27 Jan 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda i21 Tenda i21 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:i21_firmware:1.0.0.14\(4656\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda i21 Tenda i21 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:40:47.436Z
Reserved: 2024-05-04T07:22:44.057Z
Link: CVE-2024-4493
Updated: 2024-08-01T20:40:47.436Z
Status : Analyzed
Published: 2024-05-05T03:15:07.340
Modified: 2025-01-27T18:35:12.380
Link: CVE-2024-4493
No data.
OpenCVE Enrichment
No data.
EUVD