Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33252 | A vulnerability was found in Tenda AC6 15.03.05.19 and classified as critical. Affected by this issue is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
Tue, 05 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Nov 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac6 Tenda ac6 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:* cpe:2.3:o:tenda:ac6_firmware:15.03.05.19:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tenda
Tenda ac6 Tenda ac6 Firmware |
Sat, 02 Nov 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Tenda AC6 15.03.05.19 and classified as critical. Affected by this issue is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda AC6 SetOnlineDevName formSetDeviceName stack-based overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-11-05T15:20:38.088Z
Reserved: 2024-11-01T17:01:44.965Z
Link: CVE-2024-10698
Updated: 2024-11-05T15:20:31.120Z
Status : Analyzed
Published: 2024-11-02T14:15:12.980
Modified: 2024-11-04T14:20:58.853
Link: CVE-2024-10698
No data.
OpenCVE Enrichment
No data.
EUVD