Page 10 of 59 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

Tenda AC Seris Router AC18_V15.03.05.19(6318) has a stack-based buffer overflow vulnerability in function fromAddressNat El router de la serie AC de Tenda AC18 versión V15.03.05.19(6318), presenta una vulnerabilidad de desbordamiento del búfer en la región stack de la memoria en la función fromAddressNat • https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Tenda AC Series Router AC18_V15.03.05.19(6318) has a stack-based buffer overflow vulnerability in function form_fast_setting_wifi_set El router Tenda AC Series AC18 versión V15.03.05.19(6318), presenta una vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en la función form_fast_setting_wifi_set • https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/2 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

An issue was discovered on Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the 'startIp' and 'endIp' parameters for a post request, each value is directly used in a sprintf to a local variable placed on the stack, which overrides the return address of the function. Se ha descubierto un problema en dispositivos Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN y AC18 V15.03.05.19(6318)_CN. Es una vulnerabilidad de desbordamiento de búfer en el servidor web del router, httpd. • https://github.com/ZIllR0/Routers/blob/master/Tenda/stack3.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 6EXPL: 1

An issue was discovered on Tenda AC9 V15.03.05.19(6318)_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. They allow remote code execution via shell metacharacters in the usbName field to the __fastcall function with a POST request. Se ha descubierto un problema en dispositivos Tenda AC9 V15.03.05.19(6318)_CN, AC15 V15.03.05.19_CN y AC18 V15.03.05.19(6318)_CN. Permiten la ejecución remota de código mediante metacaracteres shell en el campo usbName en la función __fastcall con una petición POST. • https://github.com/ZIllR0/Routers/blob/master/Tenda/rce1.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 1

An issue was discovered on Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. There is a heap-based buffer overflow vulnerability in the router's web server -- httpd. While processing the 'mac' parameter for a post request, the value is directly used in a strcpy to a variable placed on the heap, which can leak sensitive information or even hijack program control flow. Se ha descubierto un problema en dispositivos Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN y AC18 V15.03.05.19(6318)_CN. Es una vulnerabilidad de desbordamiento de búfer basado en memoria dinámica (heap) en el servidor web del router, httpd. • https://github.com/ZIllR0/Routers/blob/master/Tenda/heapoverflow1.md • CWE-787: Out-of-bounds Write •