CVE-2024-0931Stack-based Buffer Overflow in Ac10u

Severity
9.8CRITICALNVD
CNA4.7
EPSS
0.1%
top 77.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 26

Description

A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. This vulnerability affects the function saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5tenda/ac10u15.03.06.49_multi_TDE01
NVDtendacn/ac10u_firmware15.03.06.49_multi_tde01

🔴Vulnerability Details

2
GHSA
GHSA-6qf7-fwc5-gpgg: A vulnerability classified as critical was found in Tenda AC10U 152024-01-26
CVEList
Tenda AC10U saveParentControlInfo stack-based overflow2024-01-26
CVE-2024-0931 — Stack-based Buffer Overflow in Tenda | cvebase