CVE-2024-2704

A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49. Affected by this vulnerability is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257455. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac10u_firmware:15.03.06.49:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac10u:-:*:*:*:*:*:*:*

History

12 Dec 2024, 17:27

Type Values Removed Values Added
CWE CWE-787
First Time Tenda ac10u Firmware
Tenda ac10u
Tenda
CPE cpe:2.3:h:tenda:ac10u:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac10u_firmware:15.03.06.49:*:*:*:*:*:*:*
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md - Exploit
References () https://vuldb.com/?ctiid.257455 - () https://vuldb.com/?ctiid.257455 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.257455 - () https://vuldb.com/?id.257455 - Third Party Advisory, VDB Entry

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md -
References () https://vuldb.com/?ctiid.257455 - () https://vuldb.com/?ctiid.257455 -
References () https://vuldb.com/?id.257455 - () https://vuldb.com/?id.257455 -

11 Apr 2024, 01:25

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en Tenda AC10U 15.03.06.49 y clasificada como crítica. La función formSetFirewallCfg del archivo /goform/SetFirewallCfg es afectada por esta vulnerabilidad. La manipulación del argumento firewallEn conduce a un desbordamiento de búfer en la región stack de la memoria. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257455. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

20 Mar 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-20 16:15

Updated : 2024-12-12 17:27


NVD link : CVE-2024-2704

Mitre link : CVE-2024-2704

CVE.ORG link : CVE-2024-2704


JSON object : View

Products Affected

tenda

  • ac10u_firmware
  • ac10u
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write