CVE-2024-2853 – Tenda AC10U setsambacfg formSetSambaConf os command injection
https://notcve.org/view.php?id=CVE-2024-2853
24 Mar 2024 — A vulnerability was found in Tenda AC10U 15.03.06.48/15.03.06.49. It has been rated as critical. This issue affects the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. The attack may be initiated remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2024-0932 – Tenda AC10U setSmartPowerManagement stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0932
26 Jan 2024 — A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This issue affects the function setSmartPowerManagement. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/setSmartPowerManagement.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0931 – Tenda AC10U saveParentControlInfo stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0931
26 Jan 2024 — A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. This vulnerability affects the function saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/saveParentControlInfo_1.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0930 – Tenda AC10U fromSetWirelessRepeat stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0930
26 Jan 2024 — A vulnerability classified as critical has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0929 – Tenda AC10U fromNatStaticSetting stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0929
26 Jan 2024 — A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromNatStaticSetting.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0928 – Tenda AC10U fromDhcpListClient stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0928
26 Jan 2024 — A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been declared as critical. Affected by this vulnerability is the function fromDhcpListClient. The manipulation of the argument page/listN leads to stack-based buffer overflow. The attack can be launched remotely. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromDhcpListClient_1.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0927 – Tenda AC10U fromAddressNat stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0927
26 Jan 2024 — A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function fromAddressNat. The manipulation of the argument entrys/mitInterface/page leads to stack-based buffer overflow. It is possible to launch the attack remotely. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromAddressNat_1.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0926 – Tenda AC10U formWifiWpsOOB stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0926
26 Jan 2024 — A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formWifiWpsOOB.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0925 – Tenda AC10U formSetVirtualSer stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0925
26 Jan 2024 — A vulnerability has been found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This vulnerability affects the function formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetVirtualSer.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0923 – Tenda AC10U formSetDeviceName stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0923
26 Jan 2024 — A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this issue is the function formSetDeviceName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetDeviceName.md • CWE-121: Stack-based Buffer Overflow •