Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33009 | A vulnerability classified as critical has been found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected is the function sub_42EEE0 of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Fri, 01 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda rx9 Pro Firmware
|
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:* cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.20:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda rx9 Pro Firmware
|
Wed, 23 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda rx9 Tenda rx9 Pro |
|
| CPEs | cpe:2.3:a:tenda:rx9:*:*:*:*:*:*:*:* cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda rx9 Tenda rx9 Pro |
|
| Metrics |
ssvc
|
Wed, 23 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical has been found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected is the function sub_42EEE0 of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda RX9/RX9 Pro SetStaticRouteCfg sub_42EEE0 stack-based overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-10-23T18:20:52.773Z
Reserved: 2024-10-23T06:07:35.435Z
Link: CVE-2024-10281
Updated: 2024-10-23T18:20:48.513Z
Status : Analyzed
Published: 2024-10-23T14:15:04.773
Modified: 2024-11-01T13:52:35.563
Link: CVE-2024-10281
No data.
OpenCVE Enrichment
No data.
EUVD