7 results (0.004 seconds)

CVSS: 9.0EPSS: 0%CPEs: 4EXPL: 1

A vulnerability classified as critical was found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected by this vulnerability is the function sub_42EA38 of the file /goform/SetVirtualServerCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://gitee.com/GXB0_0/iot-vul/blob/master/Tenda/RX9/20/SetVirtualServerCfg.md https://vuldb.com/?ctiid.281557 https://vuldb.com/?id.281557 https://vuldb.com/?submit.427066 https://www.tenda.com.cn • CWE-121: Stack-based Buffer Overflow •

CVSS: 9.0EPSS: 0%CPEs: 4EXPL: 1

A vulnerability classified as critical has been found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected is the function sub_42EEE0 of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://gitee.com/GXB0_0/iot-vul/blob/master/Tenda/RX9/20/SetStaticRouteCfg.md https://vuldb.com/?ctiid.281556 https://vuldb.com/?id.281556 https://vuldb.com/?submit.427065 https://www.tenda.com.cn • CWE-121: Stack-based Buffer Overflow •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 1

Missing error handling in the HTTP server component of Tenda RX9 Pro Firmware V22.03.02.20 allows authenticated attackers to arbitrarily lock the device. La falta de manejo de errores en el componente del servidor HTTP del Tenda RX9 Pro Firmware V22.03.02.20 permite a atacantes autenticados bloquear arbitrariamente el dispositivo. • https://blog.rtlcopymemory.com/tenda-rx9-pro • CWE-862: Missing Authorization •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 1

A buffer overflow in the HTTP server component of Tenda RX9 Pro v22.03.02.20 might allow an authenticated attacker to overwrite memory. Un desbordamiento de búfer en el componente del servidor HTTP de Tenda RX9 Pro v22.03.02.20 podría permitir que un atacante autenticado sobrescriba la memoria. • https://blog.rtlcopymemory.com/tenda-rx9-pro • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/setMacFilterCfg. Tenda RX9_Pro V22.03.02.10 es vulnerable al desbordamiento del búfer por medio de httpd/setMacFilterCfg • https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setMacFilterCfg.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •