Page 3 of 909 results (0.004 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Tenda AC8 16.03.34.06. It has been declared as critical. Affected by this vulnerability is the function compare_parentcontrol_time of the file /goform/saveParentControlInfo. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be launched remotely. • https://github.com/JohenanLi/router_vuls/blob/main/ac8v4/compare_parentcontrol_time_vul.md https://vuldb.com/?ctiid.280915 https://vuldb.com/?id.280915 https://vuldb.com/?submit.421340 https://www.tenda.com.cn • CWE-121: Stack-based Buffer Overflow •

CVSS: 6.5EPSS: 2%CPEs: 24EXPL: 1

A vulnerability classified as critical was found in Tenda AC1206 up to 15.03.06.23. This vulnerability affects the function ate_iwpriv_set/ate_ifconfig_set of the file /goform/ate. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/ixout/iotVuls/blob/main/Tenda/ac1206_003/report.md https://github.com/ixout/iotVuls/blob/main/Tenda/ac1206_004/report.md https://vuldb.com/?ctiid.279946 https://vuldb.com/?id.279946 https://vuldb.com/?submit.418061 https://www.tenda.com.cn • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical has been found in Tenda O6 1.0.0.7(2054). Affected is the function fromVirtualSet of the file /goform/setPortForward. The manipulation of the argument ip/localPort/publicPort/app leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O6V3.0/fromVirtualSet.md https://vuldb.com/?ctiid.275940 https://vuldb.com/?id.275940 https://vuldb.com/?submit.394032 https://www.tenda.com.cn • CWE-121: Stack-based Buffer Overflow •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Tenda O6 1.0.0.7(2054). It has been rated as critical. This issue affects the function fromSafeSetMacFilter of the file /goform/setMacFilterList. The manipulation of the argument remark/type/time leads to stack-based buffer overflow. The attack may be initiated remotely. • https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O6V3.0/fromSafeSetMacFilter.md https://vuldb.com/?ctiid.275939 https://vuldb.com/?id.275939 https://vuldb.com/?submit.394031 https://www.tenda.com.cn • CWE-121: Stack-based Buffer Overflow •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Tenda O6 1.0.0.7(2054). It has been declared as critical. This vulnerability affects the function frommacFilterModify of the file /goform/operateMacFilter. The manipulation of the argument mac leads to stack-based buffer overflow. The attack can be initiated remotely. • https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O6V3.0/fromMacFilterModify.md https://vuldb.com/?ctiid.275938 https://vuldb.com/?id.275938 https://vuldb.com/?submit.394030 https://www.tenda.com.cn • CWE-121: Stack-based Buffer Overflow •