Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33057 | A vulnerability was found in Tenda RX9 Pro 22.03.02.20. It has been rated as critical. This issue affects the function sub_424CE0 of the file /goform/setMacFilterCfg of the component POST Request Handler. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
Fri, 01 Nov 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda rx9 Pro
|
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda rx9 Pro
|
Fri, 25 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda rx9 Pro Firmware |
|
| CPEs | cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.20:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda rx9 Pro Firmware |
|
| Metrics |
ssvc
|
Thu, 24 Oct 2024 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Tenda RX9 Pro 22.03.02.20. It has been rated as critical. This issue affects the function sub_424CE0 of the file /goform/setMacFilterCfg of the component POST Request Handler. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda RX9 Pro POST Request setMacFilterCfg sub_424CE0 stack-based overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-10-25T20:50:14.294Z
Reserved: 2024-10-24T15:34:29.365Z
Link: CVE-2024-10351
Updated: 2024-10-25T20:50:03.820Z
Status : Analyzed
Published: 2024-10-25T00:15:02.533
Modified: 2024-11-01T16:15:23.800
Link: CVE-2024-10351
No data.
OpenCVE Enrichment
No data.
EUVD