Vulnerabilities (CVE)

Filtered by vendor Tenda Subscribe
Filtered by product Ac500
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-3905 1 Tenda 2 Ac500, Ac500 Firmware 2025-01-21 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been classified as critical. This affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261141 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-3906 1 Tenda 2 Ac500, Ac500 Firmware 2025-01-21 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-261142 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-3910 1 Tenda 2 Ac500, Ac500 Firmware 2025-01-21 9.0 HIGH 8.8 HIGH
A vulnerability, which was classified as critical, has been found in Tenda AC500 2.0.1.9(1307). Affected by this issue is the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261146 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-3907 1 Tenda 2 Ac500, Ac500 Firmware 2025-01-17 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been rated as critical. This issue affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-3908 1 Tenda 2 Ac500, Ac500 Firmware 2025-01-17 6.5 MEDIUM 6.3 MEDIUM
A vulnerability classified as critical has been found in Tenda AC500 2.0.1.9(1307). Affected is the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261144. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-25235 1 Tenda 2 Ac500, Ac500 Firmware 2024-11-21 N/A 7.5 HIGH
Tenda AC500 V2.0.1.9(1307) is vulnerable to Buffer Overflow in function formOneSsidCfgSet via parameter ssid.
CVE-2023-25234 1 Tenda 2 Ac500, Ac500 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda AC500 V2.0.1.9(1307) is vulnerable to Buffer Overflow in function fromAddressNat via parameters entrys and mitInterface.
CVE-2023-25233 1 Tenda 2 Ac500, Ac500 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda AC500 V2.0.1.9(1307) is vulnerable to Buffer Overflow in function fromRouteStatic via parameters entrys and mitInterface.
CVE-2024-10280 1 Tenda 20 Ac10, Ac10 Firmware, Ac10u and 17 more 2024-11-01 6.8 MEDIUM 7.5 HIGH
A vulnerability was found in Tenda AC6, AC7, AC8, AC9, AC10, AC10U, AC15, AC18, AC500 and AC1206 up to 20241022. It has been rated as problematic. This issue affects the function websReadEvent of the file /goform/GetIPTV. The manipulation of the argument Content-Length leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.