Severity
8.8HIGH
EPSS
0.2%
top 58.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 5
Latest updateSep 4

Description

A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. Affected by this issue is the function formWifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263084. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5tenda/i211.0.0.14(4656)
NVDtenda/i21_firmware1.0.0.14\(4656\)

🔴Vulnerability Details

2
GHSA
GHSA-w5r9-jpq4-6w8v: A vulnerability was found in Tenda i21 12024-05-05
CVEList
Tenda i21 formWifiMacFilterGet stack-based overflow2024-05-05

📋Vendor Advisories

1
Red Hat
kernel: mm, slub: do not call do_slab_free for kfence object2024-09-04