Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/setIPv6Status.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md | Exploit Third Party Advisory | 
| https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 07:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md - Exploit, Third Party Advisory | 
17 Sep 2022, 02:19
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:* cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:*  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.8  | 
| CWE | CWE-120 | |
| References | (MISC) https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md - Exploit, Third Party Advisory | 
16 Sep 2022, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-09-16 15:15
Updated : 2024-11-21 07:17
NVD link : CVE-2022-38830
Mitre link : CVE-2022-38830
CVE.ORG link : CVE-2022-38830
JSON object : View
Products Affected
                tenda
- rx9_pro_firmware
 - rx9_pro
 
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
