Description
A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical. This affects the function formWifiMacFilterSet. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263085 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-44110 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical. This affects the function formWifiMacFilterSet. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263085 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Mon, 27 Jan 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda i21 Tenda i21 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:i21_firmware:1.0.0.14\(4656\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda i21 Tenda i21 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:40:47.348Z
Reserved: 2024-05-04T07:22:52.322Z
Link: CVE-2024-4496
Updated: 2024-08-01T20:40:47.348Z
Status : Analyzed
Published: 2024-05-05T06:15:08.027
Modified: 2025-01-27T18:34:21.687
Link: CVE-2024-4496
No data.
OpenCVE Enrichment
No data.
EUVD