CVE-2024-2706Stack-based Buffer Overflow in Ac10u

Severity
8.8HIGHNVD
EPSS
0.4%
top 38.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 20
Latest updateAug 22

Description

A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.49. This affects the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257457 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5tenda/ac10u15.03.06.49
NVDtenda/ac10u_firmware15.03.06.49

🔴Vulnerability Details

2
CVEList
Tenda AC10U WifiWpsStart formWifiWpsStart stack-based overflow2024-03-20
GHSA
GHSA-gwhc-573h-jxwh: A vulnerability, which was classified as critical, was found in Tenda AC10U 152024-03-20

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Tenda WifiWpsStart index Parameter Buffer Overflow Attempt (CVE-2025-45429, CVE-2024-2896, CVE-2024-2811, CVE-2024-2706)2025-08-22
CVE-2024-2706 — Stack-based Buffer Overflow in Tenda | cvebase