CVE-2024-4166

A vulnerability has been found in Tenda 4G300 1.01.42 and classified as critical. Affected by this vulnerability is the function sub_41E858. The manipulation of the argument GO/page leads to stack-based buffer overflow. The attack can be launched remotely. The identifier VDB-261985 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.261985 Permissions Required VDB Entry
https://vuldb.com/?id.261985 Third Party Advisory VDB Entry
https://vuldb.com/?submit.318981 Third Party Advisory VDB Entry
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.261985 Permissions Required VDB Entry
https://vuldb.com/?id.261985 Third Party Advisory VDB Entry
https://vuldb.com/?submit.318981 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tenda:4g300_firmware:1.01.42:*:*:*:*:*:*:*
cpe:2.3:h:tenda:4g300:-:*:*:*:*:*:*:*

History

21 Jan 2025, 14:45

Type Values Removed Values Added
CPE cpe:2.3:h:tenda:4g300:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:4g300_firmware:1.01.42:*:*:*:*:*:*:*
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.261985 - () https://vuldb.com/?ctiid.261985 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.261985 - () https://vuldb.com/?id.261985 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.318981 - () https://vuldb.com/?submit.318981 - Third Party Advisory, VDB Entry
First Time Tenda
Tenda 4g300
Tenda 4g300 Firmware
CWE CWE-787

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md -
References () https://vuldb.com/?ctiid.261985 - () https://vuldb.com/?ctiid.261985 -
References () https://vuldb.com/?id.261985 - () https://vuldb.com/?id.261985 -
References () https://vuldb.com/?submit.318981 - () https://vuldb.com/?submit.318981 -

14 May 2024, 15:43

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Tenda 4G300 1.01.42 y clasificada como crítica. La función sub_41E858 es afectada por esta vulnerabilidad. La manipulación del argumento GO/página conduce a un desbordamiento de búfer en la región stack de la memoria. El ataque se puede lanzar de forma remota. A esta vulnerabilidad se le asignó el identificador VDB-261985. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.

25 Apr 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-25 12:15

Updated : 2025-01-21 14:45


NVD link : CVE-2024-4166

Mitre link : CVE-2024-4166

CVE.ORG link : CVE-2024-4166


JSON object : View

Products Affected

tenda

  • 4g300
  • 4g300_firmware
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write