CVE-2024-4066

A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.261792 Permissions Required VDB Entry
https://vuldb.com/?id.261792 Third Party Advisory VDB Entry
https://vuldb.com/?submit.316495 Third Party Advisory VDB Entry
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.261792 Permissions Required VDB Entry
https://vuldb.com/?id.261792 Third Party Advisory VDB Entry
https://vuldb.com/?submit.316495 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:ac8_firmware:16.03.34.09:*:*:*:*:*:*:*
cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*

History

21 Jan 2025, 18:55

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ac8_firmware:16.03.34.09:*:*:*:*:*:*:*
First Time Tenda
Tenda ac8
Tenda ac8 Firmware
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.261792 - () https://vuldb.com/?ctiid.261792 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.261792 - () https://vuldb.com/?id.261792 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.316495 - () https://vuldb.com/?submit.316495 - Third Party Advisory, VDB Entry

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md -
References () https://vuldb.com/?ctiid.261792 - () https://vuldb.com/?ctiid.261792 -
References () https://vuldb.com/?id.261792 - () https://vuldb.com/?id.261792 -
References () https://vuldb.com/?submit.316495 - () https://vuldb.com/?submit.316495 -

24 Apr 2024, 13:39

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Tenda AC8 16.03.34.09 y clasificada como crítica. La función fromAdvSetMacMtuWan del fichero /goform/AdvSetMacMtuWan es afectada por la vulnerabilidad. La manipulación del argumento wanMTU/wanSpeed/cloneType/mac/serviceName/serverName provoca un desbordamiento de búfer en la región stack de la memoria. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-261792. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

23 Apr 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-23 21:15

Updated : 2025-01-21 18:55


NVD link : CVE-2024-4066

Mitre link : CVE-2024-4066

CVE.ORG link : CVE-2024-4066


JSON object : View

Products Affected

tenda

  • ac8_firmware
  • ac8
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write