CVE-2023-2923 – Tenda AC6 fromDhcpListClient stack-based overflow
https://notcve.org/view.php?id=CVE-2023-2923
A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/GleamingEyes/vul/blob/main/1.md https://vuldb.com/?ctiid.230077 https://vuldb.com/?id.230077 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-31587
https://notcve.org/view.php?id=CVE-2023-31587
Tenda AC5 router V15.03.06.28 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac. • https://github.com/yanbushuang/CVE/blob/main/TendaAC5.md https://www.tenda.com.cn/download/detail-2740.html https://www.tenda.com.cn/product/AC5.html •
CVE-2023-2649 – Tenda AC23 Service Port 7329 ate command injection
https://notcve.org/view.php?id=CVE-2023-2649
A vulnerability was found in Tenda AC23 16.03.07.45_cn. It has been declared as critical. This vulnerability affects unknown code of the file /bin/ate of the component Service Port 7329. The manipulation of the argument v2 leads to command injection. The attack can be initiated remotely. • https://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md https://vuldb.com/?ctiid.228778 https://vuldb.com/?id.228778 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-30351
https://notcve.org/view.php?id=CVE-2023-30351
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.md • CWE-326: Inadequate Encryption Strength •
CVE-2023-30356
https://notcve.org/view.php?id=CVE-2023-30356
Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows attackers to update the device with crafted firmware • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_MU.md • CWE-354: Improper Validation of Integrity Check Value •