Page 3 of 15 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 1

A vulnerability classified as critical was found in Tenda AC15 15.03.05.18/15.03.20_multi. This vulnerability affects the function formExpandDlnaFile of the file /goform/expandDlnaFile. The manipulation of the argument filePath leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md https://vuldb.com/?ctiid.257662 https://vuldb.com/?id.257662 • CWE-121: Stack-based Buffer Overflow •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 1

A vulnerability classified as critical has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This affects the function addWifiMacFilter of the file /goform/addWifiMacFilter. The manipulation of the argument deviceId/deviceMac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md https://vuldb.com/?ctiid.257661 https://vuldb.com/?id.257661 • CWE-121: Stack-based Buffer Overflow •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

There is a command injection vulnerability at the /goform/setsambacfg interface of Tenda AC15 US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin device web, which can also cooperate with CVE-2021-44971 to cause unconditional arbitrary command execution Se presenta una vulnerabilidad de inyección de comandos en la interfaz /goform/setsambacfg de la web del dispositivo Tenda AC15 versión US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin, que también puede cooperar con CVE-2021-44971 para causar una ejecución de comandos arbitrarios incondicionales • https://github.com/doudoudedi/TendaAC15_vul/blob/main/TendaAC15-vul.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Tenda AC15 US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin is vulnerable to Buffer Overflow. The stack overflow vulnerability lies in the /goform/setpptpservercfg interface of the web. The sent post data startip and endip are copied to the stack using the sanf function, resulting in stack overflow. Similarly, this vulnerability can be used together with CVE-2021-44971 Tenda AC15 versión US_AC15V1.0BR_V15.03.05.20_multi_TDE01.bin, es vulnerable a un desbordamiento del búfer. La vulnerabilidad de desbordamiento de pila se encuentra en la interfaz /goform/setpptpservercfg de la web. • https://github.com/doudoudedi/TendaAC15_vul/blob/main/TendaAC15-vul.md • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

Multiple Tenda devices are affected by authentication bypass, such as AC15V1.0 Firmware V15.03.05.20_multi?AC5V1.0 Firmware V15.03.06.48_multi and so on. an attacker can obtain sensitive information, and even combine it with authenticated command injection to implement RCE. Múltiples dispositivos Tenda están afectados por una omisión de autenticación, como AC15V1.0 Firmware versión V15.03.05.20_multi... AC5V1.0 Firmware versión V15.03.06.48_multi, etc. un atacante puede obtener información confidencial, e incluso combinarla con una inyección de comandos autenticados para implementar RCE • http://ac15v10.com http://tenda.com https://github.com/21Gun5/my_cve/blob/main/tenda/bypass_auth.md • CWE-697: Incorrect Comparison •