Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33010 | A vulnerability classified as critical was found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected by this vulnerability is the function sub_42EA38 of the file /goform/SetVirtualServerCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
Fri, 01 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda rx9 Pro Firmware
|
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:* cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.20:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda rx9 Pro Firmware
|
Wed, 23 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda rx9 Tenda rx9 Pro |
|
| CPEs | cpe:2.3:a:tenda:rx9:*:*:*:*:*:*:*:* cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda rx9 Tenda rx9 Pro |
|
| Metrics |
ssvc
|
Wed, 23 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical was found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected by this vulnerability is the function sub_42EA38 of the file /goform/SetVirtualServerCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda RX9/RX9 Pro SetVirtualServerCfg sub_42EA38 stack-based overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-10-23T17:51:56.577Z
Reserved: 2024-10-23T06:07:37.708Z
Link: CVE-2024-10282
Updated: 2024-10-23T17:51:48.509Z
Status : Analyzed
Published: 2024-10-23T15:15:29.590
Modified: 2024-11-01T13:47:10.087
Link: CVE-2024-10282
No data.
OpenCVE Enrichment
No data.
EUVD