CVE-2024-4171 – Tenda W30E WizardHandle fromWizardHandle stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4171
A vulnerability classified as critical has been found in Tenda W30E 1.0/1.0.1.25. Affected is the function fromWizardHandle of the file /goform/WizardHandle. The manipulation of the argument PPW leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md https://vuldb.com/?ctiid.261990 https://vuldb.com/?id.261990 https://vuldb.com/?submit.318995 • CWE-121: Stack-based Buffer Overflow •
CVE-2024-4170 – Tenda 4G300 sub_429A30 stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4170
A vulnerability was found in Tenda 4G300 1.01.42. It has been rated as critical. This issue affects the function sub_429A30. The manipulation of the argument list1 leads to stack-based buffer overflow. The attack may be initiated remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_429A30.md https://vuldb.com/?ctiid.261989 https://vuldb.com/?id.261989 https://vuldb.com/?submit.318991 • CWE-121: Stack-based Buffer Overflow •
CVE-2024-4169 – Tenda 4G300 sub_4279CC stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4169
A vulnerability was found in Tenda 4G300 1.01.42. It has been declared as critical. This vulnerability affects the function sub_42775C/sub_4279CC. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_42775C.md https://vuldb.com/?ctiid.261988 https://vuldb.com/?id.261988 https://vuldb.com/?submit.318988 • CWE-121: Stack-based Buffer Overflow •
CVE-2024-4168 – Tenda 4G300 sub_4260F0 stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4168
A vulnerability was found in Tenda 4G300 1.01.42. It has been classified as critical. This affects the function sub_4260F0. The manipulation of the argument upfilen leads to stack-based buffer overflow. It is possible to initiate the attack remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_4260F0.md https://vuldb.com/?ctiid.261987 https://vuldb.com/?id.261987 https://vuldb.com/?submit.318987 • CWE-121: Stack-based Buffer Overflow •
CVE-2024-4167 – Tenda 4G300 sub_422AA4 stack-based overflow
https://notcve.org/view.php?id=CVE-2024-4167
A vulnerability was found in Tenda 4G300 1.01.42 and classified as critical. Affected by this issue is the function sub_422AA4. The manipulation of the argument year/month/day/hour/minute/second leads to stack-based buffer overflow. The attack may be launched remotely. VDB-261986 is the identifier assigned to this vulnerability. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_422AA4.md https://vuldb.com/?ctiid.261986 https://vuldb.com/?id.261986 https://vuldb.com/?submit.318983 • CWE-121: Stack-based Buffer Overflow •