Page 9 of 55 results (0.005 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

An XSS issue in the /goform/WifiBasicSet endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute malicious payloads via the WifiName POST parameter. Un problema de tipo XSS en el endpoint /goform/WifiBasicSet de Tenda AC15 AC1900 versión 15.03.05.19, permite a atacantes remotos ejecutar cargas maliciosas por medio del parámetro POST WifiName • https://blog.securityevaluators.com/tenda-ac1900-vulnerabilities-discovered-and-exploited-e8e26aa0bc68 https://www.ise.io/research • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device. Una credencial de Telnet embebida en el binario tenda_login de Tenda AC15 AC1900 versión 15.03.05.19, permite a atacantes remotos no autenticados iniciar un servicio telnetd en el dispositivo • https://blog.securityevaluators.com/tenda-ac1900-vulnerabilities-discovered-and-exploited-e8e26aa0bc68 https://www.ise.io/research • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 1

A CSRF issue in the /goform/SysToolReboot endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to reboot the device and cause denial of service via a payload hosted by an attacker-controlled web page. Un problema de tipo CSRF en el endpoint /goform/SysToolReboot de Tenda AC15 AC1900 versión 15.03.05.19, permite a atacantes remotos reiniciar el dispositivo y causar una denegación de servicio por medio de una carga útil alojada por una página web controlada por un atacante • https://blog.securityevaluators.com/tenda-ac1900-vulnerabilities-discovered-and-exploited-e8e26aa0bc68 https://www.ise.io/research • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

An issue was discovered on Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the 'startIp' and 'endIp' parameters for a post request, each value is directly used in a sprintf to a local variable placed on the stack, which overrides the return address of the function. Se ha descubierto un problema en dispositivos Tenda AC7 V15.03.06.44_CN, AC9 V15.03.05.19(6318)_CN, AC10 V15.03.06.23_CN, AC15 V15.03.05.19_CN y AC18 V15.03.05.19(6318)_CN. Es una vulnerabilidad de desbordamiento de búfer en el servidor web del router, httpd. • https://github.com/ZIllR0/Routers/blob/master/Tenda/stack3.md • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 6EXPL: 1

An issue was discovered on Tenda AC9 V15.03.05.19(6318)_CN, AC15 V15.03.05.19_CN, and AC18 V15.03.05.19(6318)_CN devices. They allow remote code execution via shell metacharacters in the usbName field to the __fastcall function with a POST request. Se ha descubierto un problema en dispositivos Tenda AC9 V15.03.05.19(6318)_CN, AC15 V15.03.05.19_CN y AC18 V15.03.05.19(6318)_CN. Permiten la ejecución remota de código mediante metacaracteres shell en el campo usbName en la función __fastcall con una petición POST. • https://github.com/ZIllR0/Routers/blob/master/Tenda/rce1.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •