CVE | CVE-2024-4244 |
CVE Title | |
Published Date | 2024-04-26T22:15Z |
Modified Date | 2024-04-29T12:42Z |
CWE Type | CWE-121 |
Description | A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by this vulnerability is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://vuldb.com/?id.262135 |
Reference Description | VDB-262135 | Tenda W9 DhcpSetSer fromDhcpSetSer stack-based overflow |
Reference URL | https://vuldb.com/?ctiid.262135 |
Reference Description | VDB-262135 | CTI Indicators (IOB, IOC, IOA) |
Reference URL | https://vuldb.com/?submit.319826 |
Reference Description | Submit #319826 | Tenda W9 V1.0.0.7(4456) Buffer Overflow |
Reference URL | https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md |
Reference Description | https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md |
Sources | NIST MITRE |
Note
- No CVSS data for this CVE