Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33629 | A vulnerability classified as critical was found in Tenda AC10 16.03.10.13. Affected by this vulnerability is the function FUN_0044db3c of the file /goform/fast_setting_wifi_set. The manipulation of the argument timeZone leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
Wed, 13 Nov 2024 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda ac10
|
|
| CPEs | cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda ac10
|
Tue, 12 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tenda
Tenda ac10 Firmware |
|
| CPEs | cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenda
Tenda ac10 Firmware |
|
| Metrics |
ssvc
|
Mon, 11 Nov 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical was found in Tenda AC10 16.03.10.13. Affected by this vulnerability is the function FUN_0044db3c of the file /goform/fast_setting_wifi_set. The manipulation of the argument timeZone leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Tenda AC10 fast_setting_wifi_set FUN_0044db3c stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-11-12T18:27:42.336Z
Reserved: 2024-11-10T08:45:18.006Z
Link: CVE-2024-11061
Updated: 2024-11-12T18:27:35.720Z
Status : Analyzed
Published: 2024-11-11T01:15:04.523
Modified: 2024-11-13T23:04:25.633
Link: CVE-2024-11061
No data.
OpenCVE Enrichment
No data.
EUVD