Description
A vulnerability was found in Tenda A301 15.13.08.12. It has been classified as critical. Affected is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47328 | A vulnerability was found in Tenda A301 15.13.08.12. It has been classified as critical. Affected is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
History
Fri, 01 Nov 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tendacn
Tendacn a301 Tendacn a301 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tendacn:a301:2.0:*:*:*:*:*:*:* cpe:2.3:o:tendacn:a301_firmware:15.13.08.12:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tendacn
Tendacn a301 Tendacn a301 Firmware |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T21:33:05.173Z
Reserved: 2024-06-20T05:38:53.981Z
Link: CVE-2024-6189
Updated: 2024-08-01T21:33:05.173Z
Status : Modified
Published: 2024-06-20T14:15:12.370
Modified: 2024-11-21T09:49:09.203
Link: CVE-2024-6189
No data.
OpenCVE Enrichment
No data.
EUVD