A vulnerability was found in Tenda W15E 15.11.0.14. It has been classified as critical. Affected is the function guestWifiRuleRefresh. The manipulation of the argument qosGuestDownstream leads to stack-based buffer overflow. It is possible to launch the attack remotely. VDB-261870 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.261870 | Permissions Required Third Party Advisory VDB Entry | 
| https://vuldb.com/?id.261870 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.317832 | Third Party Advisory VDB Entry | 
| https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.261870 | Permissions Required Third Party Advisory VDB Entry | 
| https://vuldb.com/?id.261870 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.317832 | Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    15 Jan 2025, 18:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.261870 - Permissions Required, Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?id.261870 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.317832 - Third Party Advisory, VDB Entry | |
| First Time | 
        
        Tenda w15e Firmware
         Tenda Tenda w15e  | 
|
| CPE | cpe:2.3:o:tenda:w15e_firmware:15.11.0.14:*:*:*:*:*:*:* cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*  | 
|
| CWE | CWE-787 | 
21 Nov 2024, 09:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md - | |
| References | () https://vuldb.com/?ctiid.261870 - | |
| References | () https://vuldb.com/?id.261870 - | |
| References | () https://vuldb.com/?submit.317832 - | 
25 Apr 2024, 13:18
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
24 Apr 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-24 20:15
Updated : 2025-01-15 18:45
NVD link : CVE-2024-4127
Mitre link : CVE-2024-4127
CVE.ORG link : CVE-2024-4127
JSON object : View
Products Affected
                tenda
- w15e
 - w15e_firmware
 
