Total
992 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-32285 | 2024-08-01 | N/A | 8.0 HIGH | ||
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the password parameter in the formaddUserName function. | |||||
CVE-2024-31803 | 2024-08-01 | N/A | 6.2 MEDIUM | ||
Buffer Overflow vulnerability in emp-ot v.0.2.4 allows a remote attacker to execute arbitrary code via the FerretCOT<T>::read_pre_data128_from_file function. | |||||
CVE-2024-30634 | 2024-08-01 | N/A | 8.0 HIGH | ||
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the mitInterface parameter in the fromAddressNat function. | |||||
CVE-2024-30633 | 2024-08-01 | N/A | 6.5 MEDIUM | ||
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the security parameter from the formWifiBasicSet function. | |||||
CVE-2024-30627 | 2024-08-01 | N/A | 8.8 HIGH | ||
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the deviceId parameter from saveParentControlInfo function. | |||||
CVE-2024-30625 | 2024-08-01 | N/A | 8.0 HIGH | ||
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the entrys parameter from fromAddressNat function. | |||||
CVE-2024-30607 | 2024-08-01 | N/A | 8.0 HIGH | ||
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceId parameter of the saveParentControlInfo function. | |||||
CVE-2024-30601 | 2024-08-01 | N/A | 8.0 HIGH | ||
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the time parameter of the saveParentControlInfo function. | |||||
CVE-2024-30599 | 2024-08-01 | N/A | 8.8 HIGH | ||
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceMac parameter of the addWifiMacFilter function. | |||||
CVE-2024-30597 | 2024-08-01 | N/A | 6.5 MEDIUM | ||
Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function. | |||||
CVE-2024-30592 | 2024-08-01 | N/A | 8.0 HIGH | ||
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the page parameter of the fromAddressNat function. | |||||
CVE-2024-30590 | 2024-08-01 | N/A | 6.5 MEDIUM | ||
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the schedEndTime parameter of the setSchedWifi function. | |||||
CVE-2024-30585 | 2024-08-01 | N/A | 6.5 MEDIUM | ||
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the deviceId parameter of the saveParentControlInfo function. | |||||
CVE-2024-30583 | 2024-08-01 | N/A | 8.0 HIGH | ||
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the mitInterface parameter of the fromAddressNat function. | |||||
CVE-2024-28535 | 1 Tenda | 1 Ac18 Firmware | 2024-08-01 | N/A | 9.8 CRITICAL |
Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the mitInterface parameter of fromAddressNat function. | |||||
CVE-2024-27657 | 2024-08-01 | N/A | 8.8 HIGH | ||
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the User-Agent parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution. | |||||
CVE-2024-27656 | 2024-08-01 | N/A | 8.8 HIGH | ||
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Cookie parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution. | |||||
CVE-2024-27655 | 2024-08-01 | N/A | 8.8 HIGH | ||
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the SOAPACTION parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input, and possibly remote code execution. | |||||
CVE-2024-27567 | 2024-08-01 | N/A | 6.5 MEDIUM | ||
LBT T300- T390 v2.2.1.8 were discovered to contain a stack overflow via the vpn_client_ip parameter in the config_vpn_pptp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | |||||
CVE-2024-26304 | 2024-08-01 | N/A | 9.8 CRITICAL | ||
There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |