CVE-2024-3881

A vulnerability was found in Tenda W30E 1.0.1.25(633) and classified as critical. This issue affects the function frmL7PlotForm of the file /goform/frmL7ProtForm. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260915. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md Broken Link
https://vuldb.com/?ctiid.260915 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.260915 Third Party Advisory VDB Entry
https://vuldb.com/?submit.312824 Third Party Advisory VDB Entry
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md Broken Link
https://vuldb.com/?ctiid.260915 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.260915 Third Party Advisory VDB Entry
https://vuldb.com/?submit.312824 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\(633\):*:*:*:*:*:*:*
cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*

History

27 Jan 2025, 16:25

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md - Broken Link
References () https://vuldb.com/?ctiid.260915 - () https://vuldb.com/?ctiid.260915 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.260915 - () https://vuldb.com/?id.260915 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.312824 - () https://vuldb.com/?submit.312824 - Third Party Advisory, VDB Entry
CWE CWE-787
CPE cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\(633\):*:*:*:*:*:*:*
First Time Tenda w30e Firmware
Tenda w30e
Tenda

21 Nov 2024, 09:30

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md -
References () https://vuldb.com/?ctiid.260915 - () https://vuldb.com/?ctiid.260915 -
References () https://vuldb.com/?id.260915 - () https://vuldb.com/?id.260915 -
References () https://vuldb.com/?submit.312824 - () https://vuldb.com/?submit.312824 -

17 Apr 2024, 12:48

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en Tenda W30E 1.0.1.25(633) y clasificada como crítica. Este problema afecta la función frmL7PlotForm del archivo /goform/frmL7ProtForm. La manipulación de la página de argumentos provoca un desbordamiento de búfer en la región stack de la memoria. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-260915. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

16 Apr 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 20:15

Updated : 2025-01-27 16:25


NVD link : CVE-2024-3881

Mitre link : CVE-2024-3881

CVE.ORG link : CVE-2024-3881


JSON object : View

Products Affected

tenda

  • w30e
  • w30e_firmware
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write