CVE-2024-2809Stack-based Buffer Overflow in Ac15

Severity
9.8CRITICALNVD
CNA8.8
EPSS
0.7%
top 27.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 22
Latest updateOct 10

Description

A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not resp

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5tenda/ac1515.03.05.18, 15.03.20_multi+1
NVDtenda/ac15_firmware15.03.05.18, 15.03.05.20_multi+1

🔴Vulnerability Details

2
GHSA
GHSA-p66f-379f-mm3c: A vulnerability, which was classified as critical, was found in Tenda AC15 152024-03-22
CVEList
Tenda AC15 SetFirewallCfg formSetFirewallCfg stack-based overflow2024-03-22

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Tenda SetFirewallCfg firewallEn Parameter Buffer Overflow Attempt (CVE-2025-8810, CVE-2025-29358, CVE-2025-1851, CVE-2024-2809)2025-10-10
CVE-2024-2809 — Stack-based Buffer Overflow in Tenda | cvebase