A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.257664 | Permissions Required |
https://vuldb.com/?id.257664 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2024-03-22T05:31:04.573Z
Updated: 2024-03-22T05:31:04.573Z
Reserved: 2024-03-21T21:34:19.498Z
Link: CVE-2024-2809
JSON object: View
NVD Information
Status : Modified
Published: 2024-03-22T06:15:08.747
Modified: 2024-05-17T02:38:31.340
Link: CVE-2024-2809
JSON object: View
Redhat Information
No data.
CWE