A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/GstDhcpSetSer_bof%26injection | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.273983 | Third Party Advisory |
| https://vuldb.com/?id.273983 | Third Party Advisory |
| https://vuldb.com/?submit.383691 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Aug 2024, 18:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\(8155\):*:*:*:*:*:*:* cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 9.8 |
| First Time |
Tenda
Tenda fh1206 Tenda fh1206 Firmware |
|
| References | () https://github.com/BeaCox/IoT_vuln/tree/main/tenda/FH1206/GstDhcpSetSer_bof%26injection - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.273983 - Third Party Advisory | |
| References | () https://vuldb.com/?id.273983 - Third Party Advisory | |
| References | () https://vuldb.com/?submit.383691 - Third Party Advisory | |
| CWE | CWE-787 | |
| Summary |
|
12 Aug 2024, 13:41
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-12 13:38
Updated : 2024-08-21 18:47
NVD link : CVE-2024-7613
Mitre link : CVE-2024-7613
CVE.ORG link : CVE-2024-7613
JSON object : View
Products Affected
tenda
- fh1206
- fh1206_firmware
