Tenda O3V2 v1.0.0.12(3880) was discovered to contain a Blind Command Injection via stpEn parameter in the SetStp function. This vulnerability allows attackers to execute arbitrary commands with root privileges.
References
Link | Resource |
---|---|
https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ | Exploit Third Party Advisory |
https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ - Exploit, Third Party Advisory |
11 Jun 2024, 14:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Tendacn o3v2
Tendacn Tendacn o3v2 Firmware |
|
CWE | CWE-77 | |
References | () https://exzettabyte.me/blind-command-injection-in-stp-service-on-tenda-o3v2/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:tendacn:o3v2_firmware:1.0.0.12\(3880\):*:*:*:*:*:*:* cpe:2.3:h:tendacn:o3v2:-:*:*:*:*:*:*:* |
05 Jun 2024, 12:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jun 2024, 19:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-04 19:20
Updated : 2024-11-21 09:22
NVD link : CVE-2024-36604
Mitre link : CVE-2024-36604
CVE.ORG link : CVE-2024-36604
JSON object : View
Products Affected
tendacn
- o3v2
- o3v2_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')